Skip to main content

Advertisement

Log in

Networking, Corruption, and Subversion

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

This paper explores the ethics of networking as a means of competition, specifically networking to improve one’s prospects of prevailing in formal competitive processes for jobs or university placements. There are broadly two ways that networking might be used to influence the outcome of some such process: through the “exchange of affect” between networker and selector, and through the demonstration of merit by networker to selector. Both raise ethical problems that have been overlooked but need to be addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. So many, in fact, that there are now competing lists picking out the best of the bunch. See for instance http://theundercoverrecruiter.com/top-10-networking-books-your-career-success/.

  2. Some such course is currently on offer at the Susanne M. Glasscock School of Continuing Studies at Rice University, http://gscs.rice.edu/The_Art_of_Networking.aspx.

  3. www.schmooze.net.au/site/about.php.

  4. This is not to say that Schonsheck’s analysis is purely Kantian. He also applies Aristotle’s virtue ethics to networking.

  5. Since this paper investigates networking from a particular motive, it obviously raises the problem of how to handle cases where there are mixed motives. This is a difficult issue, but it is a more general problem for moral philosophy—one that I cannot hope to overcome here. Military ethicists, for instance, condemn attacks that are motivated by a desire to harm civilians, while allowing some attacks that harm civilians as “collateral damage”. Where motives are mixed, there are no clear answers. Similar problems arise in bioethics, with respect to the active/passive euthanasia distinction, for example. Indeed this is a problem for any ethical argument that hinges on the motive behind the act or practice under scrutiny, so it is not unique to this paper.

  6. This is very much the dominant view of what justice in the awarding of jobs requires. See Miller (1999) and Sher (1988).

  7. Kershnar (2003), Mason (2001), and Segall (2012) consider this argument for meritocratic hiring, though all three find it faulty or limited in its real-world application.

  8. For a slightly different path to the same conclusion, see Kershnar (2003).

  9. Admittedly this may not always be true of networking. In some cases, a networking event might be built in to the official selection process, and all candidates invited to attend. Here networking is not “extramural”, but I will set these cases aside.

  10. The intuitive pull of this argument is stronger in some cases than in others. Where a formal selection process is currently underway, and a candidate attempts to arrange a private dinner with someone from the hiring committee to demonstrate his interpersonal skills, I take it most readers will feel that there is something morally problematic about this. On the other hand, if a networker attempts to ingratiate himself to prospective employers in anticipation of selection processes that he might face in the future, intuitively this may seem less troubling. Having said this, the subversion objection has purchase on both cases, so I acknowledge the intuitive difference but set this aside for present purposes.

  11. The table of rules is available online at http://courts.ms.gov/rules/msrulesofcourt/urccc.pdf. Last accessed 27/11/2014.

  12. Rules of the WSDC, last accessed 27/11/2014 http://www.schoolsdebate.com/docs/rules.asp.

  13. A study by Levashina and Campion (2007) finds that the percentage of interviewees who engage in this kind of “extensive image creation” during interview ranges from 28 to 75 %.

References

  • Abramson, L. W. (2000). The judicial ethics of ex parte and other communications. Houston Law Review, 37, 1343–1394.

    Google Scholar 

  • Arvey, R., & Renz, G. L. (1992). Fairness in the selection of employees. Journal of Business Ethics, 11, 331–340.

    Article  Google Scholar 

  • Barclay, J. M. (1999). Employee selection: A question of structure. Personnel Review, 28(1–2), 134–151.

    Article  Google Scholar 

  • Bryne, D., & Griffitt, W. (1973). Interpersonal attraction. Annual Review of Psychology, 24(3), 316–336.

    Google Scholar 

  • Byrne, D. (1969). Attitudes and attraction. In L. Berkowitz (Ed.), Advances in experimental social psychology (pp. 35–89). New York: Academic Press.

    Google Scholar 

  • Byrne, D., Clore, G. L., & Worchel, P. (1966). The effect of economic similarity-dissimilarity on interpersonal attraction. Journal of Personality and Social Psychology, 4, 220–224.

    Article  Google Scholar 

  • Carnegie, D. (1999). How to win friends and influence people., Harper business classics Pymble: HarperCollins.

    Google Scholar 

  • Dipboye, R. L. (1994). Structured and unstructured interviews: Beyond the job-fit model. Research in Personnel and Human Resource Management, 12, 79–122.

    Google Scholar 

  • Empringham, T. (2009). Great business books for small business. Retrieved November 27, 2014 from http://succeedsooner.ca/2009/10/01/great-business-books-for-small-business/.

  • Fujitsu. Fujitsu way code of conduct: Global business standards. Retrieved November 27, 2014 from http://www.fujitsu.com/downloads/PHIL/GlobalBusinessStandards_V20.pdf.

  • General Motors. Winning with integrity: Our values and guidelines for employee conduct. Retrieved November 27, 2014 from http://www.gm.com/content/dam/gmcom/COMPANY/Investors/Corporate_Governance/PDFs/WWI.pdf.

  • Geometry Global. WPP code of business conduct. Retrieved November 27, 2014 from http://www.geometry.com/conduct.

  • Goldman Sachs. Our Shared responsibility to our clients, colleagues, and communities. Retrieved November 27, 2014 from http://www.goldmansachs.com/investor-relations/corporate-governance/corporate-governance-documents/revise-code-of-conduct.pdf.

  • Haltom, J. (2009). Earwigging the chancellor prohibited: A violation of legal ethics. Mississippi Law Journal, 79, 115.

    Google Scholar 

  • Hamermesh, D. (2011). Beauty pays: Why attractive people are more successful. New Jersey: Princeton University Press.

    Google Scholar 

  • Judge, A. T., & Cable, D. M. (2004). The effect of physical height on workplace success and income: Preliminary test of a theoretical model. Journal of Applied Psychology, 89(3), 428–441.

    Article  Google Scholar 

  • Kaplan, M. F., & Olczak, P. V. (1971). Attraction toward another as a function of similarity and commonality of attitudes. Psychological Reports, 28(2), 515–521.

    Article  Google Scholar 

  • Kershnar, S. (2003). The duty to hire the most qualified applicant. Journal of Social Philosophy, 43(2), 267–284.

    Article  Google Scholar 

  • Levashina, J., & Campion, M. A. (2007). Measuring faking in the employment interview: Development and validation of an interview faking behavior scale. Journal of Applied Psychology, 92(6), 1638–1656.

    Article  Google Scholar 

  • Lubet, S. (1990). Ex parte communications: An issue in judicial conduct. Judicature, 74(2), 96–101.

    Google Scholar 

  • Mason, A. (2001). Equality of opportunity: Old and new. Ethics, 111(4), 760–781.

    Article  Google Scholar 

  • Melé, D. (2009). The practice of networking: An ethical approach. Journal of Business Ethics, 90(4), 487–503.

    Article  Google Scholar 

  • Michael, J., & Yukl, G. (1993). Managerial level and subunit function as determinants of networking behaviour in organizations. Group Organization and Management, 18(3), 328–351.

    Article  Google Scholar 

  • Miller, D. (1999). Principles of social justice. Cambridge MA: Harvard University Press.

    Google Scholar 

  • Misner, I. (2010). Networking like a pro. Irvine: Entrepreneur Press.

    Google Scholar 

  • Philips, M. (1984). Bribery. Ethics, 94(4), 621–636.

    Article  Google Scholar 

  • Pursell, E. D., Campion, M. A., & Gaylord, S. R. (1980). Structured interviewing: avoiding selection problems. Personnel Journal, 59, 907–912.

    Google Scholar 

  • Rawls, J. (1971). A theory of justice. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Roehling, M. V. (1999). Weight-based discrimination in employment: psychological and legal aspects. Personnel Psychology, 52(4), 969–1016.

    Article  Google Scholar 

  • Rolls Royce. Global code of conduct. Retrieved November 27, 2014 from http://www.rolls-royce.com/Images/016068_RR_GCoC_EN_low-res_tcm92-51656.pdf.

  • Rosenfeld, P. (1987). Impression management, fairness, and the employment interview. Journal of Business Ethics, 16, 801–808.

    Article  Google Scholar 

  • Schonsheck, J. (2000). Business friends: Aristotle, Kant and other management theorists on the practice of networking. Business Ethics Quarterly, 10(4), 897–910.

    Article  Google Scholar 

  • Segall, S. (2012). Should the best qualified be appointed? Journal of Moral Philosophy, 9(1), 31–54.

    Article  Google Scholar 

  • Sher, G. (1988). Qualifications, fairness, and desert. In N. Bowie (Ed.), Equal opportunity. Boulder: Westview Press.

    Google Scholar 

  • Smith, M., & George, D. (1994). Selection methods. In C. L. Cooper & I. T. Robertson (Eds.), Key reviews in managerial psychology. Chichester: Wiley.

    Google Scholar 

  • Society for Human Resource Management. (2014). Less than 5 minutes spent on a single resume, SHRM survey says. Retrieved July 10, 2015 from www.shrm.org/about/pressroom/pressreleases/pages/resumesurvey.aspx Accessed 10/7/2015.

  • Swift, A., & Marshall, G. (1997). Meritocratic equality of opportunity: Economic efficiency, social justice, or both? Policy Studies, 18(1), 35–48.

    Article  Google Scholar 

  • Van der Zee, K. I., Bakker, A., & Bakker, P. (2002). Why are structured interviews so rarely used in personnel selection? Journal of Applied Psychology, 87(1), 176–184.

    Article  Google Scholar 

  • Walker, C. (2001). Socialising for success. Carmarthen: Crown House Publishing.

    Google Scholar 

  • Wolff, H.-G., Moser, K., & Grau, A. (2008). Networking: theoretical foundations and construct validity. In J. Deller (Ed.), Readings in applied organizational behavior from the Lüneburg symposium: Personality at work. Mering: Rainer Hampp.

    Google Scholar 

  • WSDC. (2005). Rules of the WSDC. Retrieved November 27, 2014 from http://www.schoolsdebate.com/docs/rules.asp.

Download references

Funding

This research project was not funded or sponsored by any institution.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ned Dobos.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest.

Research Involved in Human Rights

No human studies were involved in this research.

Additional information

An earlier version of this paper was presented at the Centre for Applied Philosophy and Public Ethics, Charles Sturt University, and at the Oxford Uehiro Centre for Practical Ethics. Thanks to all who attended and provided helpful comments and suggestions. I am especially grateful to Peter Balint and Adam Henschke for their critique of earlier drafts, and to three anonymous reviewers for the Journal of Business Ethics.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dobos, N. Networking, Corruption, and Subversion. J Bus Ethics 144, 467–478 (2017). https://doi.org/10.1007/s10551-015-2853-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-015-2853-4

Keywords

Navigation