Protect your good name online

August 2013
Consumer Reports Money Adviser;Aug2013, Vol. 10 Issue 8, p12
The article looks at individuals' reputation on the Internet as of 2013, focusing on strategies for ensuring that Internet searches bring up positive information and for addressing seriously negative information that may have been posted. It notes that employers routinely investigate job candidates on the Internet. Topics include the importance of establishing profiles on social media websites such as LinkedIn.com, blogging, and third-party online reputation monitoring services. INSET: When to call the reputation police.


Related Articles

  • Las redes sociales en las bibliotecas públicas de la provincia de Málaga. SÁNCHEZ GARCÍA, Mª JOSÉ // Boletin de la Asociacion Andaluza de Bibliotecarios;jul-dic2012, Vol. 27 Issue 104, p92 

    The ongoing evolution in the use of social networks forces the libraries to be present with different profiles. This paper shows the current situation of the public libraries in the province of Malaga and their presence in the social networks.

  • Tips for managing your career on social media.  // Charlotte Post;5/30/2013, Vol. 38 Issue 38, p6B 

    The article discusses the impact of social media on jobs and career, and offers several tips on preventing career-limiting social media mistakes including being aware of the company's social media policy, updating the profile on social site Linkedln, and avoiding to post inappropriate photos.

  • Linkedln Leader or Loser? MANCINI, CHRISTINE PILCH // BusinessWest;12/31/2012, Vol. 28 Issue 16, p22 

    In this article, the author suggests professionals about their use of online social networking platform LinkedIn. According to the author, professionals should not spam sales messages via the LinkedIn message system, as it makes the members unpopular. The author also suggests that professionals...

  • WHERE TO LEARN MORE about Web 2.0 Tools Online.  // Knowledge Quest;Mar/Apr2009, Vol. 37 Issue 4, p18 

    The article reviews several Web sites including www.schoollibrarylearning2.blogspot.com, http://tametheweb.com/sljlearning20, and http://digitalresearchtools.pbwiki.com.

  • LinkedIn as a Current Awareness Tool. Bassett, Dawn // Feliciter;2013, Vol. 59 Issue 2, p14 

    The article focuses on LinkedIn, a social media tool which the author believes can be used as a resource-sharing mechanism. Launched in 2003, the professional business-oriented social network has more than 200 million members in more than 200 countries and territories. The author notes that...

  • 5 LinkedIn Marketing Tips. Towsley, Gregg Thomas // Reeves Journal: Plumbing, Heating, Cooling;Sep2014, Vol. 94 Issue 9, p40 

    The article offers five tips in using LinkedIn for the plumbing business. Topics discussed include the elements of an amazing profile, ideas on what to post as updates, the power of people search in LinkedIn's advanced search, organizing and managing contacts by sorting them into lists, and the...

  • A Marketer 's (Social) Life.  // Direct Marketing News;Apr2013, Vol. 35 Issue 4, p11 

    The article discusses the results of the survey which analyzes how much do marketers engage themselves in social networks. It states that marketers use social channels to stay connected with their colleagues and associates and get updates of the industry. It mentions that marketers participate...

  • Pro Networking Is Land Of LinkedIn. MICHELE CHANDLER // Investors Business Daily;10/20/2014, pA08 

    Simply put: LinkedIn has built itself into the leading online network for professionals and college students seeking to advance their careers.

  • Breach of Personal Security through Applicative use of Online Social Networks. Nikolovski, Bojan; Kokolanski, Vasko; Achkoski, Jugoslav; Dojcinovski, Metodija // TEM Journal;Nov2013, Vol. 2 Issue 4, p291 

    Throughout this article there is an attempt to indicate the threats of potential to breach of personal security through applicative use of internet as well as applicative use of online social networks. In addition to many other ways of privacy protection applicative users of social network's...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics