research-article2014
MCQXXX10.1177/0893318914554657Management Communication QuarterlyBerkelaar and Buzzanell
Article
Management Communication Quarterly
1 –30
Online Employment © The Author(s) 2014
Reprints and permissions:
Screening and Digital sagepub.com/journalsPermissions.nav
DOI: 10.1177/0893318914554657
Career Capital: Exploring mcq.sagepub.com
Employers’ Use of
Online Information for
Personnel Selection
Abstract
This study explores how employers report using online information to
evaluate job candidates during personnel selection. Qualitative analysis
of 45 in-depth employer interviews emphasizes how new and different
information visibility afforded by the Internet simultaneously replicates and
shifts how employers evaluate reconstructed information about candidates
during personnel selection. Data revealed that employers evaluate the
relative presence or absence of certain types of visual, textual, relational, and
technological information in patterned and idiosyncratic ways. We discuss
the likely consequences for theory and practices of personnel selection and
careers, emphasizing the increasing expectations for workers to curate digital
career capital to manage the expanding contexts within which employers
construct and evaluate professional and/or workplace identities.
Keywords
cybervetting, personnel selection, digital career capital, curating online
identity, information visibility, organizational processes, impression
management
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
2 Management Communication Quarterly
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 3
reveals how employers acquire, recontextualize, and use the presence and
absence of different types of online information to make sense of job candi-
dates. Thus, this study addresses ongoing calls to consider everyday practices
of personnel selection (Dipboye, 2014) and the impact of new technologies
on organizational processes and outcomes (Treem & Leonardi, 2012).
Understanding how employers use online information can inform personnel
selection practices—the outcomes of which affect organizational productiv-
ity, employee satisfaction (Ployhart & Weekley, 2010), individual quality of
life, and social justice (Cheney, Lair, Ritz, & Kendall, 2009). This study also
highlights how growing information visibility—and expectations thereof—
affects employment relationships and career management. In particular, we
consider how cybervetting increases demands on individuals to curate their
digital professional image in spatio-temporal contexts previously excluded
from personnel selection. We begin by describing the information context of
contemporary personnel selection before examining how cybervetting’s
characteristics likely influence job candidate evaluations.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
4 Management Communication Quarterly
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 5
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
6 Management Communication Quarterly
et al., 2002), and information aggregation (Solove, 2008). It is not just job
candidates, but also other people and technologies, that create, share, order,
and compile information—often for purposes other than employment (boyd,
2007). Even if individuals restrict access to social media sites, impressions
are shaped by “friends,” physical attributes (Walther et al., 2008), the design
of online spaces (Back et al., 2010), and the (unintentional) aggregation and
information visibility of the technologies themselves (Zuboff, 1989). In con-
trast to credit reports or criminal background checks, most online information
is created via informal, emergent processes (boyd, 2007) without due pro-
cess. Even if individuals attempt to manage online information, data frag-
ments often remain after removal attempts (Solove, 2008), sources may
refuse to remove information, and information may be broadcast further than
expected as networks are more expansive and visible than people realize
(boyd, 2007). Consequently, employers acquire information candidates may
not have intended to share with them or to share in that way (Solove, 2008).
Such information is desirable for those trying to get a sense of candidates’
real identities (Berger & Douglas, 1981) although it may not always be as
credible as often believed.
Information acquired online is reconfigured based on the algorithms of the
particular search engines or aggregators (e.g., Bing™ produces different
results and differently ordered results than Google™. Because cybervetting
occurs asynchronously and remotely, information becomes temporally and
physically decontextualized from its original context. Even if the information
acquired was framed appropriately for its originally intended communicative
context and audience, employers likely recontextualize job candidate infor-
mation given personnel selection goals because evaluators’ embodied context
and evaluative intent shape attributions (McGlone & Pfeister, 2009).
Decontextualization and recontextualization affect evaluations as communi-
cations intended for other audiences and contexts are filtered through indi-
vidual differences (Mayfield & Carlson, 1966; Metzger et al., 2010) and
professional norms (Cheney et al., 2009). Given that research demonstrates a
lack of interrater reliability for popular offline selection strategies (Mayfield
& Carlson, 1966), it is likely such effects will be amplified during cybervet-
ting because information cues often become more salient and attributions
more extreme in distributed contexts (DeAndrea & Walther, 2011).
Yet, employers rarely consider the implications of their information-seek-
ing practices. Employers often assume expertise enables accurate evaluations
(Miron-Shatz & Ben-Shakhar, 2008). However, consistent with satisficing
and common information-seeking heuristics (Metzger et al., 2010), employ-
ers stop searching after quickly reviewing initial search results (Berkelaar et
al., 2014). Negative information is rarely verified (Jablin, 2001) and is often
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 7
more salient when evaluating job candidates (Jablin, 2001; Webster, 1964).
More problematically, attempts to discount irrelevant information tend to
make such information hyperaccessible and therefore more salient (Miron-
Shatz & Ben-Shakhar, 2008).
Many people presume online information is better because it is easier to
access more data online (Treem & Leonardi, 2012); however, online informa-
tion tends to be incomplete and fragmented (Solove, 2008). The common
presumption that more is better often obscures the need to critically evaluate
information quality and relevance (Dipboye, 2014; Metzger et al., 2010).
Such beliefs will likely improve evaluations for those who disclose more, all
else being equal.
In particular, cybervetting can increase the proportion of non-work infor-
mation considered during personnel selection (Cross-Tab, 2010) because the
Internet makes certain information more visible: interests, hobbies, interper-
sonal interactions, religious/political views, relationship/parental status, and
sexual orientation (Bohn & Short, 2009). The Internet also provides more
relational, technological, and visual information than most conventional
sources and does so in a streamlined fashion (boyd, 2007). Research on
offline selection highlights how such differences can alter attributions (Jablin,
2001) such as when access to visual cues alters evaluations (e.g., attractive
applicants ranked higher; Dipboye, Fromkin, & Wilback, 1975).
Our point is not that cybervetting is a completely different personnel
selection process; rather, we argue that cybervetting’s communicative char-
acteristics are an understudied yet consequential aspect of personnel selec-
tion. Cybervetting’s communicative characteristics expand the spaces and
time within which job candidates are evaluated, the content considered, and
the order and configuration of information—all of which affect evaluations
and subsequent decisions (Case, 2012). To locate and elaborate more fully on
the ways cybervetting’s characteristics affect personnel selection, we asked
employers to describe what information they acquire and how they use, and
have used this information to inform job candidate evaluations.
Method
Sample
Participants included 45 employers (24 men, 21 women) who had actively
participated in hiring. Ranging in age from 23 to 60 years (median = 35),
participants were primarily Caucasian (82%). The sample primarily included
human resource (HR) staff, recruiters, and hiring managers (~75%) because
these are the primary roles involved in personnel selection. Because hiring
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
8 Management Communication Quarterly
Data Collection
The first author recruited participants using purposive, snowball sampling to
help identify information rich, key informants, who could offer insights of
theoretical interest and were willing to discuss sensitive topics (Charmaz,
2006). We contacted initial participants primarily via cold calls and profes-
sional contexts, recruiting a few via social media. Our intent was to create
different recruitment chains as disconnected from the researchers as possible
to mitigate limitations of snowball sampling. We initially targeted HR per-
sonnel and recruiters. We expanded levels and roles as potential characteris-
tics of interest (e.g., industry, organization size, type, organizational role,
occupation) emerged from the data. After each interview, participants were
asked whether they could recommend people who might offer different per-
spectives. We contacted subsequent participants based on whether they
seemed likely to help refine and test emerging themes (Charmaz, 2006).
Our semi-structured interview protocol allowed us to gain unexpected
insights while focusing the research on a central topic of interest (Charmaz,
2006). The first author initially asked participants to describe personnel
selection experiences and types and sources of information used. She then
asked about interpretations and evaluations made using online information.
More than half of the participants spontaneously described their use of online
information for personnel selection. Besides asking for examples of specific
situations, the first author probed for types and sources of information and the
relevance of such information for personnel selection as needed. Given
cybervetting’s debated legality and ethicality and many organizations’ pro-
tection of hiring practices as proprietary (Shilling, 2009), we included indi-
rect and hypothetical questions known to increase response rates and accuracy
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 9
for sensitive questions (e.g., “Can you tell me about someone who . . .”;
Charmaz, 2006). With participant consent, all interviews were audiotaped,
transcribed, and verified against recordings for accuracy. Interviews aver-
aged 54 minutes (range: 30-90 minutes), for a total of 38.7 hours recorded
and 682 single-spaced transcription pages, along with more than 300 pages of
handwritten field notes, and 12 pages of typed notes for three corrupted/poor-
quality recordings. After 40 interviews, responses seemed to be replicating
earlier participant responses. To verify this assumption, the first author inter-
viewed five additional employers, and we discussed emerging results with
experts. These processes helped confirm our conclusion that the data were
saturated (Lindlof & Taylor, 2010).
Data Analysis
As part of a larger project, this study focused on how employers reported
using online information for personnel selection. A separate analysis exam-
ined employer and applicant data on information ethics and an emerging digi-
tal social contract (Berkelaar, 2014). For this study, we relied on systematic
inductive and abductive data analyses (Ezzy, 2002). Taking a constant com-
parative approach informed by sensitizing concepts (Charmaz, 2006), we
compared and contrasted each subsequent interview with what had (not)
emerged previously. We used Atlas.ti™ to memo throughout data collection
and analysis. We noted emerging themes, codes, and ideas suggested by each
interview. On our first reading, we recorded initial thoughts and reactions
paying particular attention to how participants reported identifying and eval-
uating applicants’ online information. We attended to the information types
acquired and interpretations and valuations employers constructed.
After initial coding, we reread and recoded data; ran reports of all coded
items, including surrounding text to retain context; and then grouped codes
into initial axial groupings, reevaluating occurrences of the themes in the data
set based on new groupings. We generated alternative groupings to question
our initial assumptions and to test and evaluate emerging codes: We sorted,
disassembled, and reassembled the codes multiple times, independently, col-
laboratively, and in conversation with experts (Charmaz, 2006). During this
process, we noted how participants evaluated different types of information
in terms of absences and presences. Once confident we had identified promi-
nent themes, we reread the data, coding for additional occurrences and testing
themes by identifying negative cases. For example, initial uses of technologi-
cal information seemed isolated to people working in technology industries
or roles. After rereading the data, it became evident that people used techno-
logical artifacts to evaluate job candidates across industries and occupations.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
10 Management Communication Quarterly
Findings
We focus on how employers report using the presence of visual, textual,
relational, and technological online information combined with the
absence of expected online information to construct and evaluate careers
and employability. These data show how employers’ evaluations and
expectations replicate and shift conventional personnel selection processes
(Table 2).
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 11
Table 2. Online Information Employers Report Using for Personnel Selection.
What information How used
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
12 Management Communication Quarterly
Visual information. When asked what information they sought online, partici-
pants consistently responded “definitely pictures.” More than 90% reported
using online photos to evaluate job candidates. Although photos tend to be
excluded from contemporary U.S. applications, employers have used other
visual information previously.
Visual cues such as attractiveness or attire as well as “choice of font” and
paper “matter” to evaluations of professionalism (Lair et al., 2005) and exper-
tise, although effects may disappear for exceptionally qualified people
(Dipboye et al., 1975). These data indicate a shift in focus. How applications
looked used to be “such a big deal [and] unfortunately folks had to finagle a
lot with fonts and looks and stuff.” Now standard online applications “strip”
previously used visual cues for professionalism as online forms “force” peo-
ple to “conform” to standard fonts and formats. This automation removed an
“easy indicator” of professionalism and “now just kind of takes the focus off
that [formatting] to really focus on the content.” In place of abstract format-
ting cues, participants reported using online images to evaluate whether can-
didates met baseline expectations for professionalism.
Typically, participants used online photos to disqualify candidates who
evidenced the “problematic” “red flags” of popular media reports (e.g.,
Eaton, 2009). Employers disqualified applicants who posted photos of
“inappropriate” and “lewd” behavior, “pictures of them doing drugs or
something like that,” or “naughty pictures, or . . . habitual, ‘I got drunk this
weekend,’ kind of pictures and those kinds of things that would not reflect
well.” More than a third of the participants used euphemisms to describe
“photography that has raised my eyebrows.” A few others—including a
recruiter who did executive-level hiring—offered more detailed examples,
disqualifying people for “inappropriate” photos involving “nudity” or
“sticking your tongue down somebody’s throat and posting that picture
online.” Less salient, but repeatedly noted, were photos of “unprofessional
behavior” where the person “wasn’t the kind of person I would want to work
for me.” Such evaluations applied culture-specific symbols as unvalidated
heuristics to simplify evaluations. Even when prompted, no participant
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 13
I’d have certain things highlighted or flagged if they disturbed me, or if I found
them impressive. I’d still put all the info in front of the execs. If they had just
commissioned a wide search and I found someone, ah, you know, with boobie
pictures up, I would definitely not put that person in front of them . . . I would
hope that recruiting takes, you know, the average sales or customer service
person just as seriously.
Not only does this example illustrate how employers flag information that
might contribute to evaluations, it also suggests expanding professional
expectations for workers across organizational levels. Employers may now
cybervet “average” candidates for entry-level sales and customer service
positions as well as more prominent upper-management positions that have
been conventionally held to higher information visibility standards.
Moreover, the specificity and preponderance of negative examples report-
edly used to disqualify candidates demonstrates the continuing salience of
negative information during personnel selection (Jablin, 2001). This is
likely because these employers reported using images to avoid “risk” and
“minimize costs.”
When making sense of online artifacts, employers consistently recontex-
tualized information through an employment lens. Thus, even if a job candi-
date’s behavior might be considered appropriate for a picture’s original
context or intended audience, employers disqualified candidates whose
online information violated norms for employment audiences or contexts. “I
wouldn’t hire them,” participants repeatedly asserted:
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
14 Management Communication Quarterly
If they leave something on their Facebook account that they shouldn’t have
there and they know who I am and . . . that I’ll be able to see that stuff, they’ve
made a decision that impacts their job rather than me making a decision that
impacts their job.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 15
I really cannot stand typos, and I don’t like it when people type in—jargon is
not the right word—but just the shorthand that people use . . . the one who does
write out all the words and is kind of maybe a little more like me and kind of a
freakazoid about that kind of stuff . . . if they’re more well-spoken than the
others in writing, that’s a plus.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
16 Management Communication Quarterly
how often a person wrote about a particular topic operated as a proxy for moti-
vations. When assessing content created by or about applicants, employers
noted that online information provided access to individuals’ core passions or
drive: Online, “you” can learn “tons about their true interests and hobbies,
[plus] often times I can tell if someone has too much time on their hands.” Such
examples evidence employers’ assumptions that people have a singular pas-
sion, and should choose and do work in it (Berkelaar & Buzzanell, 2014).
Some reported specific examples where they did not hire or promote people
who had visible online information about “incompatible” non-work hobbies.
Moreover, employers consistently suggested that visible “free time” should be
spent doing something worthwhile from employers’ perspective (“not that
Farmville game”) otherwise candidates’ motivation would be questioned.
Unlike visual information, textual information sometimes helped qualify
rather than disqualify job candidates, particularly in white-collar work.
Employers ascribed greater professional commitment to candidates who had
online evidence of work-related behavior outside work times and spaces
compared with those who did not. Participant responses suggested that the
“right” online information could add value and help discriminate the “good”
applicants from the “best.” As one IT recruiter exemplified,
[I want to see their] life outside of the interview, see if they are trying to help
others in the support forums . . . [It’s] the final endorsement . . . If there’s
nothing there, why would I want to hire them over someone else . . . if you’re
using that as just kind of a gauge of what a person is doing with their life, it’s a
good thing to do.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 17
Relational information. Who someone knows has long been a factor for getting
a job (Granovetter, 1973). What is different with cybervetting is that online
sources, particularly social network sites, make larger, and often different,
connections within applicants’ networks visible in new ways. Even as people
leverage online connections to find jobs, these data indicate that employers
also use relational associations to verify credentials, competencies, and
character.
Just under half of these employers reported using visible relational infor-
mation to verify social capital and trustworthiness. For example, almost one
third of the employers provided explicit examples describing how they hired
candidates because of rich and deep online networks: “He got the job
because he could just log into LinkedIn and show us his network there, all
those people . . . and his connections to me.” Particularly in jobs such as sales
and recruiting, or positions involving leadership or customer service, rela-
tional visibility legitimated expertise and access to the “social capital” needed
to be a successful employee.
Employers also reported using visible networks to assess the trustworthi-
ness of applicants’ character or reputation. The visibility of a candidate’s net-
work provided employers a way to “find people I trust that are already a little
more verified.” Visible connections to the employer (i.e., “connections to
me”) increased confidence in a candidate’s character and provided a “form of
reference check.” In addition, visible connections to key people across rele-
vant industries established trustworthiness and enhanced reputational evalu-
ations. In one example, a recruitment manager used applicants’ visible
connections to (re)present the candidates as “well-connected professional[s]”
to the “high profile employers” who were their customers. Employers did not
question the nature of the relationship between visible connections, the moti-
vations leading to the connections, or the connections not visible online.
Rather, employers intuited that “I can quickly see” how “close” a candidate
is to influential or desirable contacts, assuming that the existence of connec-
tions with positive others offered votes of confidence.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
18 Management Communication Quarterly
You can see [online] if they’re involved in, like, open-source projects, to see
how they deal with collaborative efforts. If you’re looking into some of the
newer technology, like cloud computing, you can see if they’ve got expertise in
that or what their thoughts are or are they more traditional in their programming
or are they comfortable learning new things and working outside the box and
exploring.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 19
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
20 Management Communication Quarterly
I mean if you want a job in Internet marketing, you should have a face out
there, for sure, somehow. You know, make yourself a blog, make yourself a
web site, put yourself on social networking sites, but do it professionally.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 21
Thus, employers disqualified candidates who were absent online or who were
not present in expected spheres.
In general, these employers used the absence of expected information to
construct a sense of job candidates as less committed. They did not consider
alternative explanations for information absences. They situated their assump-
tions of visibility in contemporary notions that equate visibility and transpar-
ency with honesty. Indeed, the majority of these employers argued that job
candidates should be unconcerned by cybervetting if they have “nothing to
hide,” a phrase repeatedly used by these employers to justify cybervetting.
By framing themselves and/or cybervetting as honest and straightforward
and implicating those who hide or remove information as less honest or ethi-
cal, employers may reflect a naïve understanding of the potential for misin-
terpretation. This also may arise from having a “boring,” more “normal,” and
“less decorated life”: “I don’t know how I would feel if I was someone who
had, you know, a colorful lifestyle . . . You know, someone with a story [e.g.,
‘biker chick,’ ‘gay/lesbian’]. Would I feel differently? Maybe I would.” Like
this director, participants may feel as though they “have nothing to hide”
because they conform to dominant social norms.
Thus, although these employers advised digital scrubbing before job
searches, their responses also indicated that attempts at digital clean slates
may be detrimental. Not having an online presence creates information void
during evaluation processes, which may be as much of a liability as having
red flags. Not only is expertise defined through visibility (Treem & Leonardi,
2012), our data suggest job candidates might also need to communicate inter-
ests and passions for specific types of work to be considered valuable in the
marketplace.
Such need for a digitally visible career is complicated by “information
noise.” To be valuable, desirable information needs to be clearly linked to
particular applicants. For people with popular names, information about peo-
ple with the same name can create de facto or functional invisibility—or
potentially problematic misinformation. Although it is beneficial to disasso-
ciate from red flags, candidates need to be visible when seeking employment
or promotions. Unless people work diligently and have access to IT expertise
and resources, it is difficult to make their names, and associated information
stand out from the professional athletes, beauty queens, show dogs, semi–pro
wrestlers, and others with whom candidates report sharing names (Berkelaar,
2010). Moreover, employers did not express concerns that information might
be inaccurate or might not refer to candidates under scrutiny—rather, their
focus seemed to be on minimizing any possible perception of negative effect
to their organizations because of online information that seemed to be con-
nected to particular individuals.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
22 Management Communication Quarterly
Discussion
This study contributes to communication and personnel selection research in
two ways. First, by examining what information employers report acquiring
online and how they indicate making sense of acquired and “missing” infor-
mation, we help explicate cybervetting as a new tool for employment sense-
making (Table 2). Employers’ use of easily accessible secondary sources and
unobtrusive observations aligns with research on information seeking (Berger
& Douglas, 1981; Case, 2012; Treem & Leonardi, 2012) and personnel selec-
tion (Dipboye, 2014; Jablin, 2001). However, cybervetting differs in how it
leverages increasing information visibility to expand contexts, times, and
roles considered during selection and associated impression management.
Empirically examining cybervetting answers calls to consider everyday per-
sonnel selection (Dipboye, 2014) and to explicate when, if, and how online
and offline processes align (Treem & Leonardi, 2012; Williams, 2010).
Second, in light of increasing information visibility and other technology
affordances (Treem & Leonardi, 2012) undergirding cybervetting, we show
how cybervetting offers a useful context to examine contemporary assump-
tions and expectations about work and careers and the contested, changing
nature of contemporary professionalism and employment relationships.
Although new technology affordances have been explored within conven-
tional organizational boundaries (e.g., when using organizationally spon-
sored or developed tools and/or within paid-work times, places, or roles;
Treem & Leonardi, 2012; Zuboff, 1989), this study examines how cybervet-
ting expands personnel selection beyond conventional time–space–role
boundaries of paid work. In highlighting how information visibility and
expectations thereof appear to be reshaping personnel selection, our data
suggest that employers now expect, acquire, and make sense of more—and
oftentimes different—non-work information during personnel selection.
Specifically, cybervetting further erodes boundaries between work and non-
work in ways similar to, yet beyond, fuzzy work–home boundaries (Golden,
2013). Thus, cybervetting offers a context in which to address calls for
research on redefinitions of what counts as work and non-work in the digital
era, including how familial, civic, personal, and professional identities are
constructed, promoted, and evaluated (Cheney & Ashcraft, 2007; Gregg,
2011).
Although our study provided access to employers’ sensemaking of appli-
cants’ online information, our approach and sample size limit generalizability.
Despite gathering data from diverse industries, organizations, and roles, we
cannot make claims about potential occupational, cultural, or demographic
characteristics. Future research should consider different occupational or
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 23
Theoretical Implications
This study illuminates how cybervetting and the information visibility and
collapsed spatio-temporal contexts undergirding it are changing the assump-
tions and everyday work of personnel selection and impression management
and expanding these practices into non-work life. Such extensions increase
sociotechnical and communicative demands for employers who cybervet and
for current and potential employees who now need to digitally curate their
professional image. Employers expect qualified job candidates to consciously
and consistently construct an online professional presence across time, space,
and (role) contexts previously excluded from personnel selection. At the
same time, job candidates are increasingly distanced from these sensemaking
and sensegiving processes (Weick, 1995). Because employers extract infor-
mation during cybervetting, workers lack many of the cues used to adjust
impression management and sensegiving (Hogan, 2010) in the more interac-
tive if asynchronous exchanges of conventional personnel selection. Because
cybervetting often involves acquiring information intended for, created by,
and/or aggregated by other people and technologies, workers often only learn
about and can monitor online information after the fact (Hogan, 2010). This
distancing is motivation for, and an effect of, cybervetting.
Thus, this study shifts attention from more episodic information exchange
and meaning-making processes (Dipboye, 2014) toward persistent develop-
ment and management of a relatively new phenomenon that we label digital
career capital, which builds on Inkson and Arthur’s (2001) notion of career
capital—the competencies, identities, motivations, and relationships provid-
ing career value. Drawing on our findings about how employers value appli-
cants using information presences and absences, digital career capital extends
earlier perspectives by emphasizing the importance of making career capital,
and thus employability, digitally and persistently visible. Rather than focus-
ing on visible employability during active job searches, workers are expected
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
24 Management Communication Quarterly
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 25
Practical Applications
At least two possible applications emerge from this analysis. First, employers
need to consider how cybervetting’s communicative and information conse-
quences shape effectiveness of personnel selection practices. Employers cur-
rently rely on intuitive, communication-as-transmission processes because of
time and resource constraints and the risks and pressures of failed selection
decisions—because “when you’re tired, cold, and hungry, any old map will
do” (Anacona, 2012, p. 6). Researchers could help employers adapt evidence-
based selection strategies to meet cybervetting’s temporal and habitual con-
veniences and employers’ needs for outcome accuracy, while also attending
to the practical ethics of cybervetting.
A second pragmatic implication involves quandaries between applicants’
need to simultaneously manage present and absent information online and
“positive” and “negative” digital artifacts that could affect employability.
Although people have habitually monitored their professional image
(Goffman, 1959), digital impression management and information curation
involve relatively sophisticated communication strategies. Making relevant,
audience-valued information visible demands attending to the Internet’s col-
lapsed contexts, myriad authors, temporal demands, artifact decontextualiza-
tion and recontextualization, and invisible audiences (boyd, 2007). However,
cybervetting offers few, if any, and mostly ambiguous, longer term cues for
workers (e.g., repeatedly not getting the job), with little ability to self-correct
as retrievable deletions might prompt questions about the “authentic” person
(Hogan, 2010; Marwick & boyd, 2010). Moreover, non-work goals, relation-
ships, and narratives (boyd, 2007) necessarily compete with professional
images workers want to create when seeking employment.
Conceptualizing cybervetting as a problem to be redressed through train-
ing that “fixes” people who do not fit the ideal worker image precludes chal-
lenging assumptions of what indicates competence; what skills, commitments,
and roles are (de)valued; what is useful and ethical from multiple standpoints;
and variations within and among social identity groups that might be prob-
lematically interpreted. To handle such quandaries, educators and researchers
should work with employers and workers to make visible potential strategic
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
26 Management Communication Quarterly
Funding
The author(s) disclosed receipt of the following financial support for the research,
authorship, and/or publication of this article: This research was partially funded by a
Bilsland Strategic Initiatives grant sponsored by Purdue University.
References
Anacona, D. (2012). Sensemaking: Framing and acting in the unknown. In S. Snook,
N. Nohira, & R. Khurana (Eds.), The handbook for teaching leadership: Knowing,
doing, and being (pp. 3-20). Thousand Oaks, CA: Sage.
Back, M., Stopfer, J., Vazire, S., Gaddis, S., Schmukle, S., Egloff, B., & Gosling,
S. (2010). Facebook profiles reflect actual personality, not self-idealization.
Psychological Science, 21, 372-374. doi:10.1177/0956797609360756
Barsness, Z. I., Diekmann, K. A., & Seidel, M. L. (2005). Motivation and opportunity:
The role of remote work, demographic dissimilarity, and social network central-
ity in impression management. Academy of Management Journal, 48, 401-419.
doi:10.5465/AMJ.2005.17407906
Berger, C. R., & Douglas, W. (1981). Studies in interpersonal epistemology: III.
Anticipated interaction, self-monitoring, and observational context selection.
Communication Monographs, 48, 183-196. doi:10.1080/03637758109376058
Berkelaar, B. L. (2010). Cyber-vetting: Exploring the implications of online informa-
tion for career capital and human capital decisions (Unpublished doctoral dis-
sertation). Purdue University, West Lafayette, IN.
Berkelaar, B. L. (2013). Joining and leaving organizations in a global information
society. In E. Cohen (Ed.), Communication yearbook 37 (pp. 33-64). Thousand
Oaks, CA: Sage.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 27
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
28 Management Communication Quarterly
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
Berkelaar and Buzzanell 29
Maclean, M., Harvey, C., & Chia, R. (2012). Sensemaking, storytelling, and
the legitimization of elite business careers. Human Relations, 65, 17-40.
doi:10.1177/0018726711425616
Marwick, A. E., & boyd, d. (2010). I tweet honestly, I tweet passionately: Twitter
users, context collapse, and the imagined audience. New Media & Society, 13,
114-133. doi:10.1177/1461444810365313
Mayfield, E. C., & Carlson, R. E. (1966). Interview decisions: First results
from a long-term research project. Personnel Psychology, 19, 41–55.
doi:10.1111/j.1744-750.1966.tb02434.x.
McGlone, M., & Pfeister, R. A. (2009). Does time fly when you’re having fun or
do you? Affect, agency, and embodiment in temporal communication. Journal
of Language and Social Psychology, 28, 3-31. doi:10.1177/0261927X08325744
Metzger, M., Flanigan, A., & Medders, R. (2010). Social and heuristic approaches
to credibility evaluation online. Journal of Communication, 60, 413–439.
doi:10.1111/j.1460-2466.2010.01488.x
Miron-Shatz, T., & Ben-Shakhar, G. (2008). Disregarding preliminary informa-
tion when rating job applicants’ performance: Mission impossible? Journal of
Applied Social Psychology, 3, 1271-1294. doi:10.1111/j.1559-1816.2008
Peebles, K. A. (2012). Negligent hiring and the information age: How state legisla-
tures can save employers from inevitable liability. William & Mary Law Review,
35, 1396-1433.
Ployhart, R. E., & Weekley, J. (2010). Strategy, selection, and sustained competitive
advantage. In J. Farr & N. Tippins (Eds.), The handbook of employee selection
(pp. 195-212). New York, NY: Routledge.
Ramirez, A., Jr., Walther, J. B., Burgoon, J. K., & Sunnafrank, M. (2002).
Information-seeking strategies, uncertainty, and computer-mediated communica-
tion: Toward a conceptual model. Human Communication Research, 28, 213-
228. doi:10.1111/j.1468-2958.2002.tb00804.x
Scott, C. (2013). Anonymous agencies, backstreet businesses, and covert collectives:
Rethinking organizations in the 21st century. Stanford, CA: Stanford University
Press.
Shilling, D. (2009). Complete guide to human resources and the law. New York,
NY: Aspen.
Solove, D. J. (2008). Understanding privacy. Cambridge, MA: Harvard University Press.
Treem, J., & Leonardi, P. (2012). Social media uses in organizations: Exploring the
affordances of visibility, editability, persistence, and association. In C. Salmon
(Ed.), Communication Yearbook, 37 (pp. 143-186). Thousand Oaks, CA: SAGE.
Walther, J. B., Van Der Heide, B., Kim, S., Westerman, D., & Tong, S. T. (2008).
The role of friends’ appearance and behavior on evaluations of individuals on
Facebook: Are we known by the company we keep. Human Communication
Research, 34, 28-49. doi:10.1111/j.1468-2958.2007.00312.x
Webster, E. C. (1964). Decision making in the employment interview. Montreal,
Quebec, Canada: Industrial Relations Centre, McGill University.
Weick, K. E. (1995). Sensemaking in organizations. Thousand Oaks, CA: SAGE.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015
30 Management Communication Quarterly
Weiss, B., & Feldman, R. S. (2006). Looking good and lying to do it: Deception as
an impression management strategy in job interviews. Journal of Applied Social
Psychology, 36, 1070-1086. doi:10.1111/j.0021-9029.2006.00055.x
Williams, D. (2010). The mapping principle, and a research framework for vir-
tual worlds. Communication Theory, 20, 451-470. doi:10.1111/j.1468-
2885.2010.01371.x
Zuboff, S. (1989). In the age of the smart machine: The future of work and power.
New York, NY: Basic Books.
Author Biographies
Brenda L. Berkelaar, PhD, Purdue University, is an assistant professor of communi-
cation studies in the Moody College of Communication at the University of Texas at
Austin. Her research centers on work and career, with a particular emphasis on the
ways new technologies shape how we understand and practice work and career.
Patrice M Buzzanell, PhD, Purdue University, is a professor of communication in
the Brian Lamb School of Communication (and professor of engineering education by
courtesy) at Purdue University. Her research centers on the everyday negotiations and
structures that produce and are produced by the intersections of organizational com-
munication, career, and gender.
Downloaded from mcq.sagepub.com at Bobst Library, New York University on April 29, 2015