References and Suggested Readings
- Bash, D., & Walsh, D. (2011). N.Y. Representative Chris Lee resigns after Craigslist personals scandal. CNN. Retrieved from http://politicalticker.blogs.cnn.com/2011/02/09/ny-rep-chris-lee-resigns/
- Bates, D. (2010). The Facebook flirts: Three teachers fired after using website for inappropriate relationships with students. Daily Mail. Retrieved from http://www.dailymail.co.uk/news/article-1322408
- Berkelaar, B. L. (2010). Cyber-vetting: Are new communication technologies changing informational criteria for personnel selection? Paper presented at the annual meeting of the National Communication Association, San Francisco, CA.
- Foster, A., & Lovett, E. (2011). Top eleven biggest scandals of 2011. ABC news. Retrieved from http://abcnews.go.com/Entertainment/Year_In_Review/top-11-celebrity-scandals-2011/story?id=15147408
- Gibbs, J. L., Ellison, N. B., & Lai, C. (2010). First comes love, then comes Google: An investigation of uncertainty reduction strategies and self-disclosure in online dating. Communication Research, 38, 70–100. doi:10.1177/0093650210377091
- LaFlamme, M. (2011). When the workplace and social media collide. Sun Journal. Retrieved from www.sunjournal.com/bplus/story/984036
- LinkedIn Corporation. (2009). Build a robust profile. LinkedIn's Career Services. Retrieved from http://careerservices.linkedin.com/profile/
- LinkedIn Launch. (2008). How to create an account profile on LinkedIn. Retrieved from http://www.youtube.com/watch?v=0szWlfStSjY
- Love, D. (2011). Seventeen people who were fired for using Facebook. Business Insider. Retrieved from http://www.businessinsider.com/facebook-fired-2011-5
- Paton, N. (2007). Ever been cyber-vetted? The Times. Retrieved from http://business.timesonline.co.uk
- Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between married couples. Communication Theory, 311–335. doi:10.1111/j.1468-2885.1991.tb00023.x
- Petronio, S. (2008). Communication privacy management theory. In L. A. Baxter and D. O. Braithwaite (Eds.), Engaging theories in interpersonal communication: Multiple perspectives (pp. 309–322). Thousand Oaks, CA: Sage.
- Rose, A., Timm, H., Pogson, C., Gonzalez, J., Appel, E., & Kolb, N. (2010). Developing a cyber-vetting strategy for law enforcement: A special report. International Association of Chiefs of Police. Retrieved from http://www.iacpsocialmedia.org/