Web 2.0 Library Trek

Assignment 2 for the subject Social Networking for Information Professionals required a creation of a project on the topic. I created the Web 2.0 Library Trek online training program using the wiki tool Wikispaces.

Current social media tools are highlighted in order to provide a self-paced training program for public library staff to broaden their skills and knowledge in the online social media environment (Web 2.0). This program updates and extends the former 23 Things training program established by Helen Blowers in 2006 for the Public Library of Charlotte & Mecklenburg County. Helen Blowers Learning 2.0 23 Things.

This updated program will provide information and training using the latest popular tools, includes relevant compliance information, and offers investigation opportunities into associated mobile technologies. This training is to prepare library staff for the launch of the Library Social Media Program that will be launched mid-year of 2013.

The objectives of this project are:

  • To provide relevant knowledge and training to library staff about Web 2.0.
  • To provide a unified, confident and knowledgeable presence for the library using the popular online social networking websites.
  • To enable library staff to be able to initiate conversation relevant to libraries within these environments.
  • To provide library staff with the confidence to be able to engage in conversation about local, state-wide, national and international events and campaigns as opportunities arise.
  • To foster a love of reading using online social networking tools.
  • To create a unified approach to the Library Social Media Program that is professional and compliant.

The training program, Web 2.0 Library Trek, is situated online using a wiki. This is because a wiki enables easy linking to resources such as informational videos. It also allows for access for participants wherever an internet connection is available, thereby allowing work at home as well as at work. It also allows group collaboration.

The social networking tools selected for this project are the most popular and most commonly used at this moment in time. The tools will be divided and grouped by similarity of function. This should allow for a better understanding of the tools during the investigation process. The tools chosen for this project reflect those that could be used in the Public Library Social Media Program from an organisational viewpoint, although in actuality not all will be included in the proposed program.

If you are not Web 2.0 savvy then I invite you to undertake this free online training course keeping in mind that it is aimed at people working in libraries. Good luck and enjoy.


OLJ 13 – Module 5 – Social media policy links

Creating a social media policy for your organisation can seem like a daunting task especially when the online landscape of social media tools is changing every day. An obvious place to begin is with the existing documentation specific to this topic from within your organisation and the industry.

For public libraries in Australia, the following resources will assist in this task. These resources have been listed on Delicious at #SISsocialmedia

Department of Justice Social Media Policy

This is the official social media policy for employees of the Department of Justice Victoria. Citing the document Guidance for use of social media in the Victorian public sector, it defines social media, advises how to use social media professionally and personally, lists some rules of engagement, and lists some legal issues such as privacy, security, copyright, harassment, the Creative Commons and more.

Guidance for use of social media in the Victorian public sector

This document provides guidance for the governing bodies and employees of those in the Victorian public sector. It refers to the Code of Conduct for Victorian Public Sector Employees citing this as the governing advice for employee behaviour including that within the context of using social media. Definitions are provided for: social media; responsibilities; and official use and private use.

Social Media Policy National Library of Australia

This is the official social media policy for the National Library of Australia. It provides context, objectives, scope, and compliance advice for their organisation and employees.  It defines controls for official use, professional use, private use, and inappropriate use. Risks and breaches are also explained.  A statement about the record keeping requirements is included.

NSW Public Libraries Learning 2.0 Activities: Social media policies – do you have one?

This is an excellent starting point for anyone wanting to create a social media policy for public libraries in Australia. It provides relevant legislative and policy framework, policy, principles underpinning the use of social networking technology, procedures for publishing, records managements, privacy, communications processes for organisations, the approval process, a checklist of considerations, and a disclaimer example.

Social Media Governance: Empowerment with Accountability by Chris Boudreaux

This website offers a Policy Database which lists organisations worldwide with links to their social media policies. Links take you to the policies and guidelines for international companies such as: Adidas, BBC, Flickr, IBM, the International Olympic Committee, Microsoft, New Zealand government, Reuters, Telstra, UK Government, US Air force, Universities, Yahoo!, and a lot more.

HL Wiki International: Social media policies

This Canadian website is a knowledge base for Health Librarians. There is information about how to evaluate social media policies as well as links to social media policies worldwide.  Recent articles are also listed with key points from those articles provided. Links to best practices are listed and references to further relevant information resources.


Department of Justice (2012). Department of Justice Social Media Policy. Retrieved from http://www.justice.vic.gov.au/home/about+us/our+values+and+behaviours/social+media+policy/

State Government of Victoria (2010). Guidance for use of social media in the Victorian public sector.  eGovernment Resource Centre. Retrieved from http://www.egov.vic.gov.au/victorian-government-resources/website-practice-victoria/web-2-0-victoria/guidance-for-use-of-social-media-in-the-victorian-public-sector-in-pdf-format-76kb.html

National Library of Australia. (2012). Social Media Policy. Retrieved from http://www.nla.gov.au/policy-and-planning/social-media

State Library of New South Wales (2008). Social media policies – do you have one? NSW Public Libraries Learning 2.0 Activities. Retrieved from http://nswpubliclibrarieslearning21.blogspot.com.au/2008/08/social-media-policies-do-you-have-one.html

Boudreaux, C. (2009). Policy database. Social Media Governance: Empowerment with Accountability by Chris Boudreaux. Retrieved from http://socialmediagovernance.com/policies.php

HLWIKI International (2013). Social media policies. HLWIKI Canada. Retrieved from http://hlwiki.slais.ubc.ca/index.php?title=Social_media_policies&oldid=120750

OLJ 12 – Module 5 – Identity online

It’s 2013 and the social web has seen lots of development in its short lifespan. But issues around identity, privacy, security and trust are still unresolved. Social sites remain popular despite people’s concerns about their own personal online protection.

Instead of seeing positive improvement online, new social problems have emerged such as cyber-bullying, identity theft, trolling, and fraud.

Are people even trying to ‘manage’ their identity online? Twitter has shown us some very public meltdowns by well known identities who should have known better about having a public face. Acting professionally online is fine if you are indeed a professional. Is being authentic an excuse to “let it all hang out”?

There was the public rant by Justin Bieber:

“I’m 19 with 5 number one albums, 19 and I’ve seen the whole world. 19 and I’ve accomplished more than I could’ve ever dreamed of, I’m 19 and it must be scary to some people to think this is just the beginning…” (The Independent, 2013)

TV personality Charlotte Dawson was the target of some serious and hateful bullying via Twitter that resulted in her hospitalisation following her final tweet of “you win x”.

“Director of communications law centre at UTS, Professor Michael Fraser told News Ltd that online harassment was assault and that people who had taken part in the hate campaign against Dawson had committed criminal acts.  “The online world is not above the law,” Prof Fraser said. “The challenge for us is to build security into online society in the same way as we have into the physical world.”” (The Telegraph, 2012)

Personally I try to manage and control what I publish online and I am sure there are many others who take the same approach. But you only have to look at YouTube or iTunes or Twitter to see and hear that anything goes and there is an opinion, attitude, face, image, campaign, stunt, and comment for everything under the sun. I suppose it depends how seriously you wish to be considered and what privacy means to you. The more controversial someone can be the more likely they are to be noticed online and their content to “go viral” and with that the hope of making a lot of money.

Online transparency appears to be the new social currency and so people engage in these spaces fully embracing the risks they know are there. Many people are sharing so much of themselves online – they want their own voice to be heard and noticed. But Danny Brown questions this notion of transparency saying that we are not really being totally transparent especially if we are silently sitting by, knowing that cyberbullying is occurring and not speaking up against it.

It’s our friends that are being picked on. It’s our colleagues that are being affected. And, most importantly, it’s our morals that are being compromised by staying silent.” (Brown, 2013)

Pavlina Papalouka is a personal development coach based in Cyprus who, typically, is keen to emphasize the positive side of building a personal online identity.

“People today want the truth, even if it’s ugly. Sugar coating, pretense and phony posing are no longer acceptable. It doesn’t matter how much effort you put into portraying you are something else that the real you – being authentic is what really matters. Those who realize this and take certain actions will succeed more than anyone else in this new environment.” (Papalouka, 2013)

This infographic by Mark Smiciklas offers some advice about how to achieve transparency when engaging with social media tools. Encouraging this open and transparent approach to online engagement seems at odds with a basic human attitude towards protecting the security of our organisations and our personal lives. Finding a sensible balance is necessary.

Social Media transparency (Smiciklas, 2013)

Social Media transparency (Smiciklas, 2013)


Brown, D. (2013). The Fallacy of Transparency in Social Media. Danny Brown – Social Media and Marketing Blog. Retrieved from http://dannybrown.me/2013/03/06/the-fallacy-of-transparency-in-social-media/

The Independent (2013). Justin Bieber’s Instagram rant: edited highlights. The Independent. Retrieved from  http://www.independent.co.uk/voices/iv-drip/justin-biebers-instagram-rant-edited-highlights-8535871.html

Papalouka, P. (2013). Phony is out, real is in – Transparency is the new currency. Retrieved from http://pavlinapapalouka.com/entrepreneurship/phony-is-out-real-is-in-transparency-is-the-new-currency/

Smiciklas, M. (2013). Social media transparency. Retreived from http://www.socialmediaexplorer.com/social-media-marketing/social-media-transparency-infographic/attachment/social-media-transparency/

The Telegraph (2012). Charlotte Dawson Twitter attack sparks call for changes to laws against cyber bullying. The Telegraph. Retrieved from http://www.dailytelegraph.com.au/news/charlotte-dawson-twitter-attack-sparks-call-for-changes-to-laws-against-cyber-bullying/story-e6freuy9-1226461809720

Wikipedia (2013). Cyberbullying  – Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Cyberbullying

Wikipedia (2013). Identity theft – Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Identity_theft

Wikipedia (2013). Troll (Internet) – Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Troll_(Internet)