Summary and Keywords
Broadly speaking, cybervetting can be described as the acquisition and use of online information to evaluate the suitability of an individual or organization for a particular role. When cybervetting, an information seeker gathers information about an information target from online sources in order to evaluate past behavior, to predict future behavior, or to address some combination thereof. Information targets may be individuals, groups, or organizations. Although often considered in terms of new hires or personnel selection, cybervetting may also include acquiring and using online information in order to evaluate a prospective or current client, employee, employer, romantic partner, roommate, tenant, client, or other relational partner, as well as criminal, civil, or intelligence suspects. Cybervetting takes advantage of information made increasingly available and easily accessible by regular and popular uses and affordances of Internet technologies, in particular social media. Communication scholars have long been interested in the information seeking, impression management, surveillance, and other processes implicated in cybervetting; however, the uses and affordances of new online information technologies offer new dimensions for theory and research as well as ethical and practical concerns for individuals, groups, organizations, and society.
Keywords: cybervetting, social media screening, online screening, surveillance, open-source intelligence, impression management, information seeking, personnel selection, uncertainty reduction, attributions, signaling, warranting theory
Access to the complete content on Oxford Research Encyclopedia of Communication requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription. If you are a student or academic complete our librarian recommendation form to recommend the Oxford Research Encyclopedias to your librarians for an institutional free trial.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.