The vertical search engine SimplyHired has opened a new portal specifically for new grad jobs. Yes, it works for librarian.
In Canada, the vertical search engine Eluta, offers a similar new grad search filter, with Library and Info Studies in the Master of Science menu selection.
I am a librarian who works in a post-secondary career center. I want to share some of the work search and business resources that I have found useful in my work. I also manage the Facebook group of the same name for library job seekers.
Friday, April 9, 2010
Library Internships
At first glance, ALA Connect is dominated by professional development (i.e. for fee courses) but there are several library internships listed within the opportunities exchange. A few are highlighted under the New Opportunities menu on the left-hand side of the page.
Other internships:
Other internships:
- Idealist.org Internships search
- United Nations Human Resources (search both Internships and Information Management)
- Canadian Library Association Internship and Work Experience Programs in Canadian Libraries
- With summer upon us, you better be on the board for FSWEP (limited to Canadians)
- Canadian Heritage Information Network: Jobs in Heritage
- National Gallery of Canada Internships
- NPR Internships
- Presidential Libraries Internship Opportunities
- Go Abroad: Library and Info Science Internships
Thursday, April 8, 2010
Book Review: Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier
The authors of Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier include the CEO and Chief Counsel of ReputationDefender, a company that specializes in online reputation management. Though the book does advertise the services of their company, they also lay out a plan that a reader who understands the nature of the tactics described could use to protect their online reputation. Their plan could also be used to create documentation in case a question every arose about the veracity of the information in the attack, or may prove useful to law enforcement should an online reputation attack veer from malice to harassment or RL violence.
The authors explain the reasons why strangers, acquaintances or customers may use a search engine to look for information on a person. Verifying identity, reputation and claims of expertise may be the most common reasons. Employers, for example, will perform an online search to verify claims and credentials. Since a great deal of public information has moved online, it makes sense to conduct a search via Google, if only to satisfy curiosity.
The authors try to explain the motives of people who destroy online reputations—unfortunately, there may be no reason for wrecking a reputation except boredom—and they describe some of the tactics and tricks that reputation thieves use. Some of the tactics include:
The book does recommend for fee services, a few affiliated with ReputationDefender, for managing online reputation. However, there is a plan laid out in the book that person, who has read the entirety of the book and who understands the nature of online reputation attacks, can use to protect their personal and professional reputations. Reputation checking will require ongoing effort and it is worthwhile to document attacks and their clean up, in case there are questions about the attack or you need to submit a file to law enforcement.
If I have one big problem with the book, it is that I discovered that the site listed in the references, http://wildwest2.com, does not lead to a companion website for the book. The index/home page leads to the Amazon listing of the book. The links provided in the references at the end of each chapter, such as http://wildwest2.com/go/813 found on page 147, lead only to a broken links. Now a researcher will be able to find the actual references, but the implication of providing links like this is that, well, they will work and will lead the reader to useful resources.
Librarians who are looking for work may want to use the information outlined to check up on their online reputation--and I know for a fact that libraries are checking out their applicants online--and they may need to use it to defend the online reputation of their library. Sadly, only about an hour after finishing this book, I did have to recommend it to a client who was facing personal attacks online; though I was sorry about the attacks, I was glad to be able to give the person a resource to use so they could understand the nature of the attacks and how to resist them effectively.
Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier
The authors explain the reasons why strangers, acquaintances or customers may use a search engine to look for information on a person. Verifying identity, reputation and claims of expertise may be the most common reasons. Employers, for example, will perform an online search to verify claims and credentials. Since a great deal of public information has moved online, it makes sense to conduct a search via Google, if only to satisfy curiosity.
The authors try to explain the motives of people who destroy online reputations—unfortunately, there may be no reason for wrecking a reputation except boredom—and they describe some of the tactics and tricks that reputation thieves use. Some of the tactics include:
- Googlebombing involves manipulating search results so that a search for other terms will lead to this person’s profile. The example the authors used is the “miserable failure” search leading to the biography of then-President George W Bush.
- Googlestuffing where top level search results are filled with erroneous information about the person searched for.
- “False flagging”, or becoming a double. Some examples include impersonating someone in a forum, blog—as in Fake Steve Jobs—or in a social networking site, like Facebook. Some of these impersonations have highly sinister overtones, especially if they masquerade as a family member.
The book does recommend for fee services, a few affiliated with ReputationDefender, for managing online reputation. However, there is a plan laid out in the book that person, who has read the entirety of the book and who understands the nature of online reputation attacks, can use to protect their personal and professional reputations. Reputation checking will require ongoing effort and it is worthwhile to document attacks and their clean up, in case there are questions about the attack or you need to submit a file to law enforcement.
If I have one big problem with the book, it is that I discovered that the site listed in the references, http://wildwest2.com, does not lead to a companion website for the book. The index/home page leads to the Amazon listing of the book. The links provided in the references at the end of each chapter, such as http://wildwest2.com/go/813 found on page 147, lead only to a broken links. Now a researcher will be able to find the actual references, but the implication of providing links like this is that, well, they will work and will lead the reader to useful resources.
Librarians who are looking for work may want to use the information outlined to check up on their online reputation--and I know for a fact that libraries are checking out their applicants online--and they may need to use it to defend the online reputation of their library. Sadly, only about an hour after finishing this book, I did have to recommend it to a client who was facing personal attacks online; though I was sorry about the attacks, I was glad to be able to give the person a resource to use so they could understand the nature of the attacks and how to resist them effectively.
Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier
Subscribe to:
Posts (Atom)