Friday, October 7, 2011

Vitual Identity Investigation

Below are instructions to conduct an investigation on “potential” applicants for the company. The body of this instruction into three main sections: preparation, conducting the research on different internet tools and lastly compiling the information. The procedure will come under each website we come across. Do not skip them. Completing these instructions will assist with evaluations in the hiring process. The investigation will take from 30 minutes to two hours.

Intro to Body:
   A) Preparing for the investigation
   B) Conducting the research on websites
          1) Google         
          2) Facebook
          3) Blogger/Wordpress/Xanga
          4) Email
   C) Compiling information

What is Virtual Identity?
Courtesy of
- Virtual identity is the characteristics of someone that has been inputted into the internet database. It is what describes your online personality. Depending on how the user input the data, that information can be of great help or lead to a greater disaster.

Actions that should be prevented:

Remember to be ethical when investigating. Do not discriminate a candidate’s background information. We are looking for values that will be resourceful to the company. Personal feelings should not be put into the investigation. These instructions should only be used for hiring purposes for PetroChem.


A) Preparing for the Investigation:

You will need the things listed below before you begin.

  • Substantial knowledge on accessing the internet
  • Fast internet speed
  • Information of applicant e.g. Application letter, Resume
  • Have account and access to websites mentioned above


B) Conducting the Research on Website:

1. (1)
     a) Go to

     b) Type the applicant full name + description in the Google search bar..
          ‡ Refer to picture (1)
          ‡ Example: Jason Smith – Texas A&M University

     d) Click ‘Google Search’.
          ‡ There will be searches related to the applicant.

     e) Proceed on.
          ‡ No information will be found at this point.

2. Facebook (2)
     a) Go to name

     b) Log in to your Facebook account

     c) Request to be friend with the applicant.

     d) Check on his background information and extra-curricular activities.

     e) Check his activity level on Facebook.
          ‡ Self-discipline and focus is needed in the work place.

     f) Write down important information about the applicant.
          ‡ Make note of applicant current activities, prior achievements, and who he socializes.

3. Blogger/WordPress/Xanga (3)
     a) Search these websites for applicant.
          ‡ Such examples are


     b) Send a message to the user to bypass privacy settings to their blog if applicable.

     c) Study their blogs and posts.
          ‡ Notice how the applicant writes and what the contents are.

     d) Evaluate the candidate personality and character through the information obtained.
          ‡ Find out about the user on the positive and negative side.
          ‡ This will be needed at the end of this investigation.

4. Email (4)
     a) Access the applicant email addresses.
          ‡ It will be listed on their Facebook, Blog and also their resume.

     b) Count the number of email addresses.
          ‡ Email with .edu will be for education purposes while .com is for commercial/ general usage.
          ‡ Understand the meaning of having separate emails for personal and working purposes.


C) Compiling Information

     - At this point, you are finished with your investigation.
     - You will need to compile all the notes taken and create general comments.



After following the instructions, you should be able to conclude the aspects of the applicant in terms of their education background, personality, work experience, professionalism and character. Divide them into similar categories. Also include the applicant weaknesses and strengths. This will make things easier when you report to your boss in a memo format. This set of instructions does not teach you how to use each website. If you have trouble using the available internet tools, seek help from knowledgeable seniors or peers.

All graphics of companies’ logos are copyright protected by their respective entities.

© Cheong Hao Yeong, October 1, 2011

No comments: