You are on page 1of 3



You must be a curator to access & s

Join us in Vegas at ASSE
June 24-26 • Booth #1764
Enter to WIN AN iPAD MINI!


o enhance your value to any organization, one must become a “curator” that can identify, select, qualify, and organize essential information. Why is this important? Daniel Pink in his book, “To Sell is Human” (Pink 2012), addresses the major shift that has occurred with the unlimited access to information that has changed what we do and how we manage our organizations. Pink discusses how information was once controlled by a designated specialist who had the only access to and control of information.

“Curation – The act of curating, of organizing and maintaining of a collection of artworks or artifacts” (“Curation,” n.d.) The term Curation is now used to cover the gathering, organizing, and maintaining of all types of information. Today’s technology allows massive amounts of information to be readily available through an Intranet (internal database) or the Internet. Because of this fire hose stream of information, you should consider developing a disciplined practice of managing data. “Content Curation is the process of sorting through the vast amounts of content on the web and presenting it in a meaningful and organized way around a specific theme. The work involves sifting, sorting, arranging, and publishing information.”(Kanter, n.d.)

You can dedicate your time elsewhere…

Why is curation important?
If you are asked by your manager to make a presentation on the status of a safety-related issue, can you quickly access the correct information? Not only must you ensure that your information is timely, you may have to respond to information brought to you from leadership and employees that they have found in researching the same subject. “First, in the past, the best salespeople were adept at accessing information. Today, they must be skilled at curating it — sorting through massive troves of data and presenting to others the most relevant and clarifying pieces.”(Pink, 2012) “But the teacher works to convince his class to part with resources — time, attention, effort.” (Pink, 2012)

v hn r e s c vice s .e w ry w ta w plimen for a com ut program g a T o Lockout- sment.* s as es
ALUE $1,450 V


As safety professionals, what we sell is our knowledge and expertise in return for the leadership team’s and employees’ time, attention, and effort that is required to sustain the safety management system. The goal is to be able to interpret data and information so that the leadership and employees are on the “same page.”

Research and selecting information
A number of resources or search engines are available to find information. For example, the Google “Advanced Search” feature provides a page to narrow down and refine a search statement. (“Google Advance Search,” n.d.) Google “Inside Search” provides a list of search operators to gain additional control over your search. (“Google Inside Search,” n.d.) Google Scholar provides a way to locate scholarly literature across many disciplines and sources such as articles, books, abstracts, etc. (“Google Scholar,” n.d.) Your role is to become the trusted source for quality resources, interpretation of findings, and developing consensus on how the information is to be used and action plans developed. By properly referencing and citing your sources, the leadership team and employees are ensured that you have provided the best source to resolve the identified concern. “With electronic search tools, you can often locate dozens or even hundreds of potential sources for your topic… Your challenge will be to home in on a reasonable number of quality

When you’re no longer worried about Lockout-Tagout compliance.
ESC guarantees your workplace is protected by taking Lockout-Tagout off your plate, so you can start worrying a little less today.

ESC is the world’s largest provider of Lockout-Tagout services with a track record of saving companies millions.
*ESC will evaluate your existing Lockout-Tagout program for compliancy to help uncover any gaps.


Lockout-Tagout is what we do.TM

ish06134esc.indd 1



5/8/13 11:40 AM

06p40-41Froughton.indd 40

5/28/13 4:27 PM

). ISHN JUNE 2013 www. Are there any organizational guidelines or standards for sharing of resources? 5. (n. those truly worthy of your time and attention… Your challenge will be to read them with an open mind and a critical eye. Who controls the resources? 7.” n. and adapt for use. To Sell Is Human: The Surprising Truth About Moving Others.indd 41 5/28/13 4:28 PM . CPCU.5 UK: Scotland License. with experience in social media productivity and author who manages several web Google Inside Search. D. “Safety Culture. non coated or as protective sleeves for all of your cut and heat resistant applications. Docear allowed us to increase our structuring and sharing of information and aided greatly in managing our book content. Also available as Samurai™ Taeki5® series are available in nitrile. They have a new book. LLC. What naming convention will be used? Google Scholar. Docear. Licensed under a Creative Commons Attribution Google Advance Search. An Innovative Leadership Approach” being published October 2013. My Job Hazard Analysis. Edinburgh University Data Library.d.” 2011) RESOURCES A Safety Management System depends on the quality and timeliness of the information that it receives. What resources will be recovered if lost? 14. (n. How long will documents be retained? 10. Who is your audience? 6. safety manuals. (n. Creative Commons Attribution 2. What are the special privacy or security requirements? 12. James and Nathan coauthored. 7 X 10 Research Data Management Guidance.indd 1 See us at ASSE Booth 657 CIRCLE 225 FOR FREE INFO 5/15/13 1:49 PM 06p40-41Froughton. “Job Hazard Analysis. Content Curation W4iu3S Hacker. His current interest is safety culture and safety management systems. How often will these resources need to be updated? 9.). Pink. Six Sigma Black Belt.usa. This tool can provide an excellent framework to tie the safety management system elements and its information together so that they can be tracked and accessed effectively and efficiently. email. What will be the storage and backup strategy? 13. Martin’s. U. Retrieved from http://www. (2003).) BIBLIOGRAPHY Curation. (“Docear.). inspections. words.” (Hacker. Retrieved from http:// bit. leather faced. Crutchfield Consulting. etc.globalglove. A writer’s reference. and adapt for use. CSP. B.” n. and job hazard analysis. Wiktionary. What resources need to be distributed — hardcopy. a Wiki-Based Open Content Directory.d. ( 13915 Radium St NW. Bedford/St. Retrieved from http://1. cut and heat protection. and concepts are added. e-copy? 3. sorting and categorizing information The following example checklist provides potential questions that can be used to address Curation requirements: 1. ARM. Organizing.sales@globalglove.5 UK: Scotland License. to which associated 1/8 inch bleed ASTM Level 4 Cut Resistance! James Roughton. Public Domain. Department of Permission to reprint. is an accomplished safety professional. Volume 1: Concepts and Principles. Minneapolis MN 55303 ish060134taekismall2.d.CSP.” (“Mindmap. A Guide for Voluntary Compliance and Beyond”. Creative Commons Attribution 2.d.d. Retrieved from http://bit. A Mind Map is often created around a single word or text.ed.S. reports.d. (2012). Google.41 s & sell your knowledge & expertise sources. and foam rubber dips. Human Performance Improvement Handbook. Permission to reprint. August). What is the Curation budget? 8. H. we discovered a combination of mind mapping and literature repository provided in a free resource. 2003) Heinemann 2007. D. 2. Google. (n.ishn. Nathan Crutchfield .). Butterworth Samurai™ made with Taeki5® offers comfort dexterity. Live area. Are tools or software needed to create/ process/visualize the documents? (“Research Data Management Guidance.) “Mind Map is a diagram used to visualize and outline information. Retrieved from http:// books. Retrieved from http://bit.0 United States License. regulations. ARP. (n. Retrieved from http://bit.). modify. Riverhead Books. newsletters. What type of documents will be needed? For example. (2009). placed in the center. Retrieved from http://bit.d. modify. In a recent book www. training materials and media. How will these resources be managed? 4.

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. .