ABSTRACT

Introduction Important questions about cybervetting have remained unanswered for several years, and until recently, compelling evidence has been lacking about the necessity and value of cybervetting to an enterprise. A key question is what kind of results Internet searches will produce when they are added to the evaluative process for background investigations and other personnel security measures. Two recent studies-published here for the first time-shed light on the answers needed to make valid risk management decisions.