Academic literature on the topic 'Cybervetting'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybervetting.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybervetting"
Schroeder, Amber N., Kaleena R. Odd, and Julia H. Whitaker. "Agree to disagree: Examining the psychometrics of cybervetting." Journal of Managerial Psychology 35, no. 5 (2020): 435–50. http://dx.doi.org/10.1108/jmp-09-2018-0420.
Full textRozsa, Zoltan, and Iveta Kmecová. "Cybervetting prospective employees of SMEs." Journal of International Studies 13, no. 1 (2020): 295–309. http://dx.doi.org/10.14254/2071-8330.2020/13-1/19.
Full textBerkelaar, Brenda L. "Cybervetting, Online Information, and Personnel Selection." Management Communication Quarterly 28, no. 4 (2014): 479–506. http://dx.doi.org/10.1177/0893318914541966.
Full textHedenus, Anna, and Christel Backman. "Explaining the Data Double: Confessions and Self-Examinations in Job Recruitments." Surveillance & Society 15, no. 5 (2017): 640–54. http://dx.doi.org/10.24908/ss.v15i5.6380.
Full textMelton, James, Robert Miller, Brent R. Jensen, and Vishal Shah. "Decisions, decisions: Cybervetting through the eyes of students." Journal of Education for Business 93, no. 5 (2018): 252–59. http://dx.doi.org/10.1080/08832323.2018.1442785.
Full textGruzd, Anatoliy, Jenna Jacobson, and Elizabeth Dubois. "Cybervetting and the Public Life of Social Media Data." Social Media + Society 6, no. 2 (2020): 205630512091561. http://dx.doi.org/10.1177/2056305120915618.
Full textJacobson, Jenna, and Anatoliy Gruzd. "Cybervetting job applicants on social media: the new normal?" Ethics and Information Technology 22, no. 2 (2020): 175–95. http://dx.doi.org/10.1007/s10676-020-09526-2.
Full textCook, Ryan, Rachael Jones‐Chick, Nicolas Roulin, and Kim O'Rourke. "Job seekers' attitudes toward cybervetting: Scale development, validation, and platform comparison." International Journal of Selection and Assessment 28, no. 4 (2020): 383–98. http://dx.doi.org/10.1111/ijsa.12300.
Full textBackman, Christel, and Anna Hedenus. "Online privacy in job recruitment processes? Boundary work among cybervetting recruiters." New Technology, Work and Employment 34, no. 2 (2019): 157–73. http://dx.doi.org/10.1111/ntwe.12140.
Full textBerkelaar, Brenda L., and Patrice M. Buzzanell. "Cybervetting, Person–Environment Fit, and Personnel Selection: Employers' Surveillance and Sensemaking of Job Applicants' Online Information." Journal of Applied Communication Research 42, no. 4 (2014): 456–76. http://dx.doi.org/10.1080/00909882.2014.954595.
Full textDissertations / Theses on the topic "Cybervetting"
Berger, Julia Lizabeth. "Cybervetting: A Common Antecedents Model." Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1431690206.
Full textGonne-Victoria, Benjamin, Guillaume Lécuellé, and Nagisa Sasaki. "Students' perceptions of online personal branding on social media sites." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-65789.
Full textBooks on the topic "Cybervetting"
Appel, Edward J. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition. Taylor & Francis Group, 2014.
Find full textCybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition. Taylor & Francis Group, 2014.
Find full textAppel, Edward J. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition. Taylor & Francis Group, 2014.
Find full textBook chapters on the topic "Cybervetting"
Berger, Julia L., and Michael J. Zickar. "Theoretical Propositions About Cybervetting: A Common Antecedents Model." In Social Media in Employee Selection and Recruitment. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29989-1_3.
Full text"International and Domestic Principles." In Cybervetting. CRC Press, 2014. http://dx.doi.org/10.1201/b17651-12.
Full text"Professional Standards and the Internet." In Cybervetting. CRC Press, 2014. http://dx.doi.org/10.1201/b17651-13.
Full text"The Insider Threat." In Cybervetting. CRC Press, 2014. http://dx.doi.org/10.1201/b17651-14.
Full text"Internet Vetting and Open- Source Intelligence Policy." In Cybervetting. CRC Press, 2014. http://dx.doi.org/10.1201/b17651-15.
Full text"Tools, Techniques, and Training." In Cybervetting. CRC Press, 2014. http://dx.doi.org/10.1201/b17651-16.
Full text"Proper Procedures for Internet Searching." In Cybervetting. CRC Press, 2014. http://dx.doi.org/10.1201/b17651-17.
Full text"Preparation and Planning." In Cybervetting. CRC Press, 2014. http://dx.doi.org/10.1201/b17651-18.
Full text