References
- American Psychological Association. (2010). Ethical principles of psychologists and code of conduct (2003, Amended June 1, 2010). Washington, DC: Author.
- Argento, M. (2015, January 10). York City cop put on administrative leave for alleged racist Facebook comments. The York Daily Record. Retrieved August 25, 2015, from http://www.ydr.com/crime/ci_27287087/york-city-cop-put-administrative-leave-racist-facebook
- Black, S. L., & Johnson, A. F. (2012). Employers’ use of social networking sites in the selection process. The Journal of Social Media in Society, 1, 8–28.
- Bradbury, D. (2014). Unveiling the dark web. Network Security, 2014, 14–17. doi:10.1016/S1353-4858(14)70042-X
- California Commission on Peace Officer Standards and Training. (2013, January). Background investigation manual: Guidelines for the investigator (California POST Publication No. POST2006S&E-0379.V3). West Sacramento, CA: Author. Retrieved January 20, 2016, from http://lib.post.ca.gov/Publications/bi.pdf
- Colquitt, J. (2001). On the dimensionality of organizational justice: A construct validation of a measure. Journal of Applied Psychology, 86, 386–400. doi:10.1037/0021-9010.86.3.386
- Duffy, D. J. (1982). Privacy in the workplace: Constitutional restrictions on employers. Employment Relations Today, 11, 305–310. doi:10.1002/ert.3910110311
- Duffy, E. (2006, November 1). Employers use Facebook in hiring process. The Observer. Retrieved from http://www.ndsmcobserver.com/2.2754 /employers-use-facebook-in-hiringprocess-1.263806
- Facebook. (2015). Company Info. Facebook Newsroom. Retrieved August 23, 2015, from http://newsroom.fb.com/company-info/
- Georgia Peace Officer Standards and Training Council. (2009). Manual for background investigators. Clarkdale, GA: Author. Retrieved January 10, 2016, from https://www.gapost.org/pdf_file/bkgrndinv.pdf
- Hadley, S. J. (2005, December 29). Adjudicative guidelines for determining eligibility for access to classified information. Washington, DC: The White House. Retrieved May 16, 2016, from http://www.fas.org/sgp/isoo/guidelines.html
- Hoback, C. (2013, July 12) Terms and conditions may apply. [Television documentary]. USA: Hyrax Films.
- Hubert, K. (2014). Evidence collection from social media sites. Bethesda, MD: SANS Institute.
- Impinna, J. C. (2015). Leveraging the federal public trust clearance model in state government personnel security programs. Bethesda, MD: SANS Institute.
- Johnson, K., Swartz, J., & Della Cava, M. (2016, March 29). FBI hacks into terrorist’s iPhone without apple. USA Today. Retrieved May 18, 2016, from http://www.usatoday.com/story/news/nation/2016/03/28/apple-justice-department-farook/82354040/
- LinkedIn Corporation. (2015). About us: About LinkedIn. LinkedIn Newsroom. Retrieved August 23, 2015, from https://press.linkedin.com/about-linkedin
- Mullin, J. (2013, June 12). NSA leaker Ed Snowden’s life on Ars Technica: Snowden was TheTrueHOOHA, anime fan, gamer; he opined on government, too. Ars Technica. Retrieved August 25, 2015, from http://arstechnica.com/tech-policy/2013/06/nsa-leaker-ed-snowdens-life-on-ars-technica/
- National Council of State Legislatures. (2015, December 29). Access to social media usernames and passwords. Retrieved January 22, 2015 from http://www.ncsl.org/research/telecommunications-and-information-technology/employer-access-to-social-media-passwords-2013.aspx
- OPD community officer on administrative duty after controversial Facebook post. (2015, August 13). News 96.5. Retrieved August 17, 2015, from http://www.news965.com/news/news/local/opd-community-officer-administrative-duty-after-co/nnKBQ/
- Oriyano, S. P. (2014). Hacker techniques, tools, and incident handling (2nd ed.). Burlington, MA: Jones & Bartlett Learning, LLC.
- Picano, J., Williams, T. J., Roland, R., & Long, C. (2011). Chapter 2–Operational psychologists in support of assessment and selection: Ethical considerations. In C. H. Kennedy & T. J. Williams (Eds.), Ethical practice in operational psychology: Military and national intelligence applications (pp. 29-49). Washington, DC: American Psychological Association.
- Rhode Island Police Accreditation Commission. (2015, March). Accreditation standards manual 1st ed. rev. West Warwick, RI: Author. Retrieved January 21, 2016, from http://nkpolice.org/documents/RIPAC%20 Accreditation%20Standards%20Manual%20-%20First%20Edition %20May%202013%20-%20Revised%203-17-2015.pdf
- Schiffman, L. (2007). Employers using Facebook information when hiring. North by Northwestern. Retrieved from http://www.northbynorthwestern.com/2 007/11/5072/employers-use-facebookinformation-when-hiring/
- Spilberg, S. W., & Corey, D. M. (2014). Peace officer psychological screening manual. West Sacramento, CA: California Commission on Peace Officer Standards and Training.
- Stone, D. L., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, protections mechanisms. Research in Personnel and Human Resources Management, 8, 459–468.
- Stoughton, J. W., Thompson, L. F., & Meade, A. W. (2013). Examining applicant reactions to the use of social networking websites in pre-employment screening. Journal of Business and Psychology, 30, 73–88. doi:10.1007/s10869-013-9333-6
- Swallow, E. (2011). How recruiters use social networks to screen candidates. Mashable. Retrieved October 23, 2011 from www.mashable.com
- Twitter, Inc. (2015). Twitter usage/company facts. Twitter. Retrieved August 31, 2015, from https://about.twitter.com/company
- Young, J., Harvey, S., & Staal, M. A. (2011). Chapter 3–Ethical considerations in the conduct of security clearance evaluations. In C. H. Kennedy & T. J. Williams (Eds.), Ethical practice in operational psychology: Military and national intelligence applications (pp. 51-68). Washington, DC: American Psychological Association.