SlideShare a Scribd company logo
1 of 74
SOCIAL MEDIA USED IN HIGHER
EDUCATION

  Anne Arendt
Sample Timeline
1.   Wikipedia (online encyclopedia) 2001;
2.   del.icio.us (social bookmarking) 2003;
3.   MySpace 2003 (social networking);
4.   Facebook (social networking) 2004;
5.   Flikr (social media) 2004; and
6.   YouTube (social media) 2005

(Higher Education Academy and the Joint Information Systems Committee).
Let‟s Check Some Statistics
   • http://www.pewinternet.org/
   • http://www.jisc.ac.uk/
   • http://www.internetworldstats.com/
   • http://www.census.gov/
   • http://searchenginewatch.com/
   • http://www.google.com/publicdata/directory
8 to 18 Year Olds in the U.S.
Today, 8-18 year-olds devote an average of 7 hours and
38 minutes (7:38) to using entertainment media across a
typical day (more than 53 hours a week).

And because they spend so much of that time „media
multitasking‟ they actually manage to pack a total of 10
hours and 45 minutes (10:45) worth of media content into
those 7½ hours.

http://www.kff.org/entmedia/entmedia012010nr.cfm
Possible Roles
• Social-based learning – students want to leverage emerging
    communications and collaboration tools to create and
    personalize networks of experts to inform their education
    process.

• Un-tethered learning – students envision technology-enabled
    learning experiences that transcend the classroom walls and
    are not limited by resource constraints, traditional funding
    streams, geography, community assets or even teacher
    knowledge or skills.
•
    Digitally-rich learning – students see the use of relevancy-
    based digital tools, content and resources as a key to driving
    learning productivity, not just about engaging students
    in learning.
• Source: http://www.tomorrow.org/speakup/pdfs/SUNationalFindings2009.pdf
Types of Space
• Secret/private/personal space: eg Short Message Service
    (SMS); Instant Message (IM)
•   group space: eg Bebo, Facebook
•   publishing space: eg blogs, wikis, YouTube
•   performance space: eg Second Life, World of Warcraft
•   participation space: eg meetings, markets, events
•   watching space: eg lectures
    (Locke 2007)
Generational
The consequences of this generation‟s
experience have become increasingly apparent
over time:
 • a strong sense of a community linked in its own virtual spaces of
   blogs and social networking and gaming sites;
 • a similarly strong sense of group identity; and
 • a disposition to share and to participate.
Generational
They also include:
  • impatience – a preference for instant answers;
  • a downgrading of text in favor of image; and
  • a casual approach to evaluating information and attributing it, and
    also to copyright and legal constraints”

  (Higher Education Academy and the Joint Information Systems Committee, 2009).
Scenario: Boundaries
• In [BCU2], the students admitted that the Facebook group
  set up for pre-induction was useful but they did not want
  university interactions in Facebook to continue once they
  had joined the university.
• In contrast, in [ARU] and in [LSBU], the educators were
  allowed access to their students‟ profiles on Facebook but
  in [UM], some students were hesitant about interacting
  with their educators on Facebook as they perceived
  Facebook as a social space rather than an
  academic space (Minocha, 2009).
   Source: http://www.jisc.ac.uk/media/documents/projects/
   effective-use-of-social-software-in-education-finalreport.pdf
FREEDOM OF SPEECH/EXPRESSION
• Freedom of speech (expression) in the United States is
  protected by the First Amendment to the United States
  Constitution and by many state constitutions and state
  and federal laws.
• The First Amendment to the United States Constitution is
  part of the Bill of Rights and was adopted in 1791.
Freedom of Expression
• It provides that: Congress shall make no law respecting
 an establishment of religion, or prohibiting the free
 exercise thereof; or abridging the freedom of speech, or of
 the press; or the right of the people peaceably to
 assemble, and to petition the Government for a redress of
 grievances.
Freedom of Expression
• The right to freedom of speech is recognized as a human
  right under Article 19 of the Universal Declaration of
  Human Rights (UDHR) and recognized in international
  human rights law in the International Covenant on Civil
  and Political Rights (ICCPR).
• UDHR: Everyone has the right to freedom of opinion and
  expression; this right includes freedom to hold opinions
  without interference and to seek,
  receive and impart information and ideas
  through any media and regardless of frontiers.
Scenario
                  Joseph Frederick was 18 when
                  he unveiled the 14-foot paper
                  sign on a public sidewalk
                  outside his Juneau, Alaska, high
                  school in 2002 and was
                  suspended due to it.
Frederick sued, claiming his constitutional
rights to free speech were violated.


   Morse v. Frederick, 551 U.S. 393 (2007)
Morse v. Fredrick
• Joseph Frederick was suspended in 2002 for displaying a
 sign saying "Bong Hits 4 Jesus" at a rally for the Olympic
 torch relay. The rally was an off-campus event not
 sponsored by Frederick's school. A federal appeals court
 agreed with the ACLU that the school had violated
 Frederick's right to free speech. The Supreme Court
 heard the case during the 2006 term and ruled that Alaska
 public school officials did not violate Joseph Frederick's
 free speech rights by
 punishing him.
Morse v. Fredrick
• The Supreme Court decision did not resolve all of the
 issues in the case. Frederick claimed his speech rights
 under the Constitution of Alaska were violated, and the
 issue was argued in front of the Court of Appeals in
 September 2008. However, the school district agreed to
 settle out of court before the judges reached a decision. In
 November 2008, the district paid Frederick $45,000 to
 settle all remaining claims and agreed to hire a neutral
 constitutional law expert to lead a forum on student
 speech at Juneau-Douglas
 High School by the end of the school year.
Freedom of Expression
Questions to ask yourself:
  • Would a similar situation on the Internet have the same impact?
    Why or why not?
  • What about the Tinker v DesMoines case where the Supreme
    Court said, “young people do not "shed their constitutional
    rights at the schoolhouse gate," ruling that students have the
    right to free speech at school, as long as their speech does not
    disrupt the educational process.
  • What does right to free speech mean?
GENERAL PERMISSIONS
• As JISC Legal notes, “the variables which are likely to
 require consideration by the institution in drawing up its
 [Web 2.0] policy are:
  • Whether the institution, in general terms, supports the use of Web
    2.0 technologies
  • Whether permission extends to both internally and externally
    hosted Web 2.0 services
  • Whether permission extends to all areas of business (teaching,
    research and administration) and to all members of staff
  • What formalities will be imposed
    by your institution on the use of Web 2.0
    technologies (JISC Legal, 2008a)
COPYRIGHT AND INTELLECTUAL
PROPERTY
• Generally speaking, we have well established rules and
  norms for individual, joint, institutional and vendor IP
  ownership. We also have reasonably well established
  academic norms for attribution. However, the devil is in
  the details (Cate, 2009).
• We can now distribute rights almost any way we want to
  distribute them.
• Copyright and intellectual property policy and
  enforcement includes a number of areas such as
  patents, trademarks, trade secrets, right of publicity, and
  copyrights.
Copyright and IP
• Copyright is a form of protection provided by the laws of
 the United States (title 17, U. S. Code) to the authors of
 “original works of authorship,” including
 literary, dramatic, musical, artistic, and certain other
 intellectual works. This protection is available to both
 published and unpublished works.
Copyright and IP
• Fair Use:
• Section 107 contains a list of the various purposes for
 which the reproduction of a particular work may be
 considered fair, such as criticism, comment, news
 reporting, teaching, scholarship, and research.
Copyright and IP
Section 107 also sets out four factors to be considered in
 determining whether or not a particular use is fair:

1. The purpose and character of the use, including
   whether such use is of commercial nature or is for
   nonprofit educational purposes
2. The nature of the copyrighted work
3. The amount and substantiality of the portion used in
   relation to the copyrighted work as a whole
4. The effect of the use upon the potential market for, or
   value of, the copyrighted work
Scenario
In [SC], students were uncomfortable about uploading on
Flickr the photographs they were taking on the course as
they felt that they had no control about who was looking at
the photographs and using them. The concern about
sharing resources was raised particularly where students
were asked to share reflections with a group of people who
were potentially going to comment on what had been
written; commenting on others‟ reflections was
also considered uncomfortable by the
students [UL] (Minocha, 2009).

 Source: http://www.jisc.ac.uk/media/documents/projects/
 effective-use-of-social-software-in-education-finalreport.pdf
CREATIVE COMMONS & THE PUBLIC
DOMAIN
• Tools that release or selectively release copyright are
  gaining a foothold. One example of this is the Creative
  Commons.
• Before we start, let‟s remind ourselves what attribution is.
  It is the ascribing of a work (as of literature or art) to a
  particular author or artist (Merriam-Webster).
Creative Commons
• http://www.creativecommons.org/
• Larry Lessig of Stanford is pursuing something called the
 Creative Commons which frees materials from
 automatically applied copyright restrictions by providing
 free, easy-to-use, flexible licenses for creators to place on
 their digital materials that permit the originator to grant
 rights as they see fit (Fitzergerald, 2007; Smith &
 Casserly, 2006).
Creative Commons
• There are six major licenses of the Creative Commons:
  • Attribution (CC-BY)
  • Attribution Share Alike (CC-BY-SA)
  • Attribution No Derivatives (CC-BY-ND)
  • Attribution Non-Commercial (CC-BY-NC)
  • Attribution Non-Commercial Share Alike (CC-BY-NC-SA)
  • Attribution Non-Commercial No Derivatives (CC-BY-NC-ND)
• New! Now also CC0 with no attribution


See http://creativecommons.org
Creative Commons - ccLearn
• ccLearn, a subset of Creative Commons, focuses
  specifically on open learning and open educational
  resources.
• Learn more at http://learn.creativecommons.org
PRIVACY, DATA PROTECTION AND
FREEDOM OF INFORMATION

• In considering privacy, data protection, and freedom of
 information laws, we need to consider normative and
 ethical issues as well as legal ones.
Privacy and Data Protection
• Privacy: Privacy is defined using Article 12 of the
  Universal Declaration of Human Rights (UDHR) and
  Article 17 of the International Covenant on Civil and
  Political Rights (ICCPR):
• UDHR: No one shall be subjected to arbitrary interference
  with his privacy, family, home or correspondence, nor to
  attacks upon his honour and reputation. Everyone has the
  right to the protection of the law against such interference
  or attacks.
Privacy and Data Protection
As JISC Legal notes, “Many web 2.0 technologies place
users at a point where submission of personal data is
necessary to use the tool. This brings with it risks
concerning the privacy and personal data of individuals”
(JISC Legal, 2008b). This causes a number of data
protection and freedom of information issues.
Privacy and Data Protection
In essence, “Data protection law allows individuals to
control the collection, use and transfer of personal
information about them. There may be situations where the
setting up of student accounts by staff on externally Web
2.0 sites is a transfer of personal data, which must be done
in compliance with the relevant legislation” (JISC
Legal, 2008a)
Privacy and Data Protection
• Some questions to ask ourselves:
  • What records does the activity generate for which institutions are
    responsible?
  • Do they contain data that carry obligations of confidentiality,
    limitations on use or disclosure, requirements for ready
    access/availability?
  • How and where are they maintained?
  • Can materials be accessed when needed for course and
    institutional purposes?
  • What do hosting sites do with the data created
    by course participants?
  • When are you or your students conducting
    human subjects research? (Cate, 2008).
Scenario
At [ARU] there was a concern about the open environment
in Second Life where it is easy for avatars (other than the
core team on the course) to wander in and disrupt the
class. In [LSBU], there is a mix of open and closed spaces.
A space where academic work was available was open to
the general public in order to give the students‟ work
greater exposure, as were students‟ blogs. On the social
network however, a closed group was used in order to
ensure the privacy of students‟ profiles
and postings from educators (Minocha, 2009).
Source: http://www.jisc.ac.uk/media/documents/projects/
effective-use-of-social-software-in-education-finalreport.pdf
ACCESSIBILITY
• Telecommunications Act –Section 255
  (http://www.fcc.gov/cgb/consumerfacts/section255.html )
• Rehabilitation Act - U.S. Section 508
  (http://www.section508.gov/ )
• Americans with Disabilities Act (ADA)
  (http://www.usdoj.gov/crt/ada/ )
Scenario
• iTunesU, Apples‟ was not accessible to the blind until
 September of 2008. “John Olivera of the Massachusetts
 Commission for the Blind said the state approached Apple
 for help in making the wealth of educational material in
 iTunes U available to blind students” (McLean, 2008).




   Source: http://www.jisc.ac.uk/media/documents/projects/
   effective-use-of-social-software-in-education-
   finalreport.pdf
LIABILITY
There are three types of liability issue which should be
 taken into account in relation to an institution‟s use of Web
 2.0 technologies:

1. Contract based liability due to breach of contract
2. Negligence based liability due to failure to meet the
   required standard of care
3. Specific liabilities such as for defamatory or obscene
   content
Scenario
Several institutions used software that had a facility for the
community itself to „police‟ the content, and to report
inappropriate usage. At [UW], the ability for the Elgg based
social network to be monitored by the users was perceived as a
benefit. In [OU1], the course team took the decision to build a
„report abuse‟ button, which users could use to identify
inappropriate images or comments in OpenStudio. This was
used occasionally, but „in the cases where it was used the
images were found not be inappropriate in the context of the
course. Actively moderating images with a course of this scale
would have been too difficult.‟ (Minocha, 2009)

  Source: http://www.jisc.ac.uk/media/documents/projects/
  effective-use-of-social-software-in-education-finalreport.pdf
RELIANCE ON AN EXTERNALLY
PROVIDED SERVICE
Dr Chris Adie, at the University of Edinburgh, suggested
the following to be examined in relation to the assurance of
service that an institution might require:
1. “The Security of the Service Provider”
  For how long can the external Web 2.0 service provider
   be expected to be around?
Reliance
2.        “Confidentiality”
     To what extent does the service provider respect the protection of
      information where appropriate (such as personal data, sensitive
      information about the institution‟s business, or confidential
      information – in relation to a patentable invention, for example).
3.        “Ownership of Data”
     To what extent (if any) does the Web 2.0 service provider claim
      ownership of submissions and contributions?
Reliance
4.         “Security of Data”
     In addition to the matters noted under confidentiality above, there is
       the question of the safety of the data – both in terms of back-up,
       and in terms of unauthorized access.
5.         “Performance”
     To what extent does the service provider agree to a particular
      standard of performance, and is there any possible remedy if that
      standard isn‟t met?
6.         “Reliability”
     To what extent is the service stable and resilient? How often will it
      not be available?
Reliance
7.        “Support”
     How good are the reference sources of help, and the interactive
      assistance (such as a helpdesk)?
8.        “Single Sign-On”
     To what extent can use of the Web 2.0 service be included under the
      standard institutional sign-on?
9.        “Lock-in”
     To what extent legally (due to contractual obligations) and technically
      (due to compatibility) would the institution be tied-in to a particular
      technology?
Reliance
10.   “Longevity”
 What is the service provider‟s policy on maintaining unused accounts
  and data?
11.   “Functional Stability”
 To what extent is the provision of the service likely to change over
  time? (Adie, 2007)
Reliance
Questions to ask ourselves:
 • What are terms of jurisdiction?
 • Whose law applies?
 • What authority does faculty have in contracting with third parties?
 • If individual faculty sign for themselves and dispute arises from use,
   is the institution liable and bound by the agreement?
 • If not, can it defend/indemnify faculty member? (Cate, 2009)
Scenario
In [LSBU], one student‟s account on Facebook was
terminated, resulting in the loss of her academic work on
Facebook. Project teams found that they could not control
the registration of users. As a result, educators may not
able to provide support to students who have lost their
password or forgotten their user id. For example, in [SC]
some Flickr user ids were abandoned because of this.
In the future, projects may be able to look to initiatives such
as OpenID () to provide some level of commonality
for account management (Minocha, 2009 ).

Source: http://www.jisc.ac.uk/media/documents/projects/
effective-use-of-social-software-in-education-finalreport.pdf
SOCIAL BOOKMARKING
(FOLKSONOMY)
• DEMO: Social Bookmarking
  http://del.icio.us
• Social bookmarking sites work to build communities of
  users based on their decision to link to, cite, and
  otherwise reference specific websites, journals, and other
  resources.
Scenario
In [SU], the students were asked to annotate their entries
onto a social bookmarking website with their names. Some
of the students were not willing to do this, which meant that
some entries were anonymous. This had implications for
checking a student‟s involvement and progress with the
course.




Source: http://www.jisc.ac.uk/media/documents/projects/
effective-use-of-social-software-in-education-
finalreport.pdf
SOCIAL NETWORKING AND PROFILES

• DEMO: Facebook
  http://www.facebook.com/
• A social network service focuses on building online
  communities of people who share interests and/or
  activities, or who are interested in exploring the interests
  and activities of others.
Social Networking
• Questions to ask ourselves:
  • What issues arise if a faculty in a traditional class chooses to
    put all of his/her supplemental course materials on Facebook
    (or a similar platform)?
  • What if the instructor requires a Facebook account to view the
    information?
  • What if the instructor does not require a Facebook account to
    view the information?
Scenario
Educators and organizations face the dilemmas about
whether, and to what extent communications in social
networking sites should be moderated (eg [RH]), and what,
if any, interventions should be undertaken. Institutions face
the dilemma of policing the content versus leaving the
discussions to take their own course (and thus to
encourage participation, especially when the social
software initiative has been set up to collect requirements
and opinions [RH] (Minocha, 2009).

Source: http://www.jisc.ac.uk/media/documents/projects/
effective-use-of-social-software-in-education-finalreport.pdf
BLOGS
• DEMO: WordPress Blog
  http://www.wordpress.com/
• A blog (a contraction of the term "weblog") is a type of
  website, usually maintained by an individual with regular
  entries of commentary, descriptions of events, or other
  material such as graphics or video. Often end-users can
  respond directly, and publically, to
  Blog postings.
Blogs
Risks associated with defamatory or obscene content
 include:
 • Blog contributors publishing defamatory materials could make
   institution liable by association
 • Inadequate “notice and take down” procedures for offending
   material
 • Potential damage to institutional reputation
   (JISC, 2008b).
Scenario
Students were working in schools, and were told not to use of
the names of the schools, pupils or teachers in their blog entries.
However some students did not follow this guidance. The blog
was private, however if it had been open to the public domain
this could have had serious implications for the university. In
[UW], one student raised a personal issue related to health
online. Staff felt that it was a private issue and was not
appropriate for discussion in a public place and removed the
post. In [UM] students were advised about online privacy and
safety guidelines (Minocha, 2009).


Source: http://www.jisc.ac.uk/media/documents/projects/
effective-use-of-social-software-in-education-finalreport.pdf
Open Educational Resources
DEMO: Open Educational Resources
http://search.creativecommons.org/

Open Educational Resources include educational
content intended for re-use by others at no cost. It
includes course materials, syllabi, tests, video, and
more. It can be used by anyone (self directed
learners, students, faculty, whomever wishes)
Samples:
http://www.academicearth.com/
http://ocw.mit.edu/
OPEN ACCESS JOURNALS &
PUBLICATIONS
• DEMO: Directory of Open Access Journals
  http://www.doaj.org/
• Open access journals are those that are scholarly journals
  publicly available at no cost to the end user.
OA Journals
• It is advised that users insure that the content
  has proper Creative Commons attribution for their
  needs.
• If posting your own content publically it is advised
  you understand the applicable creative commons
  attributions
• Additionally, if authors of published works are
  considering placing their materials on open
  access sites such as Selected Works, they need
  to ensure that the journal or place of publication
  does not retain copyrights that do not permit this.
COLLABORATIVE & INTERACTIVE
ENVIRONMENTS, INCLUDING WIKIS
• Demo: Wiki
  http://www.wikipedia.com/
• The wiki serves the role of an information resource and as
  a publishing platform. This could create risks concerning
  the legal validity of the information contained in them
  (JISC Legal, 2008). Additionally, “Collaborative creations
  in wikis can involve a multitude of combinations in
  terms of the creators involved”
  (JISC Legal, 2008).
Collaborative
• Risks associated with adding content include:
  • Copying, adapting and communicating contents without permission
  • Adding, removing or altering material without permission
  • Inaccurate or misleading content
  • Difficulties identifying an author for subsequent changed treatment
    of content
  • Multiplicity of authors could lead to disputes over copyright
    ownership (JISC Legal, 2008).
Scenario
• The use of wikis highlighted students‟ concerns about
 shared production and editing each others‟ work [UH]. In
 the wiki, the „ownership‟ of contributions can be
 unclear, and perceptions of ownership can vary among
 group members (Minocha, 2009).




Source: http://www.jisc.ac.uk/media/documents/projects/
effective-use-of-social-software-in-education-finalreport.pdf
DOCUMENT SHARING
• DEMO: Google Docs or SlideShare
• Document sharing sites allow you to share and
  collaborate online.
• Examples:
  • http://docs.google.com
  • http://www.slideshare.com
Document Sharing
Questions to ask ourselves:

• Who is the „owner‟ of the information, particularly if there
  is more than one editor?
• Who is able to view this document or resource (group,
  individuals, public) and how?
• Who has the ability to make this document public and
  how?
• •If the information is being put on a third party site, what
  rights does the third party have regarding the content?
MICROBLOGGING
• DEMO: Twitter
  http://www.twitter.com
• Micro blogging is a form of multimedia blogging that
  allows users to send brief text updates or micromedia
  such as photos or audio clips and publish them
Scenario
• If the Twitter accounts or blogs are kept private or open to
 only a few selected users, then there could be a negative
 impact on group dynamics (concerns in [PU]) as there will
 be limited communication.
PHOTO & VIDEO SHARING & EDITING
• DEMO: Flickr
  http://www.flickr.com/
• There are a multitude of sites that permit you to share
  images and videos.
• Example: http://www.youtube.com
Scenario
• In [SC], students were uncomfortable about uploading on
 Flickr the photographs they were taking on the course as
 they felt that they had no control about who was looking at
 the photographs and using them (Minocha, 2009).




Source: http://www.jisc.ac.uk/media/documents/projects/
effective-use-of-social-software-in-education-finalreport.pdf
Social Media in Education
Here are some ways in which Social media tools can be
  useful in the classroom:
• Move students from searching for information to using
  and creating it
• Incorporate multiple learning styles into student projects
  and research
• Integrate 21st century skills into the curriculum
Social Media in Education
• Teach information literacy and participate in a
  networked public culture
• Foster more collaboration with teachers, other
  students, and community
• Share information (and labor) with colleagues
• Encouraging creative expression, gain
  authentic audiences, and get useful feedback
• Showcase or promote activities
 (Baumbach, 2009)
Social Media in Education
The seven highest-ranking priorities for social media use by
district administrators were:

   1.    Keep students interested and engaged in school
   2.    Meet the needs of different kinds of learners
   3.    Develop critical thinking skills
   4.    Develop capabilities in students that can't be acquired through
         traditional methods
   5.    Provide alternative learning environments for students
   6.    Extend learning beyond the school day
  7.    Prepare students to be lifelong learners
        (CoSN, 2009).
Social Media in Education
Educational Goals of Social Software
• Initiating new ways of learning
• Recording group discussions
• Giving control to students
• Simulating work environments and providing transferable
  skills to the students
• Peer-to-peer learning
• Critiquing each other‟s work
• Reflective learning
Social Media in Education
• Problem- and inquiry-based learning
• Collation of resources
• Skills Development
• Team working and online collaboration skills
• Organizing a virtual class
• Immediate (instantaneous) support from the educator and
    fellow students
•   Creating a digital identity
•   Improving the effectiveness of face-to-face tutorials and
    seminars
•   Fostering community building and participation of
    students in university-wide initiatives
•   Social engagement
Social Media in Education
CONCERNS OF
INSTITUTIONS, EDUCATIONS & STUDENTS
OF USING TOOLS IN THE PUBLIC DOMAIN:
• Students want to remain anonymous in the public domain
• Data protection and privacy concerns
• Concerns about the public nature of the social networking
  group
• Lack of control over social software
  tools in the public domain
Social Media in Education
• Reliability of the service
• Concerns about support from external companies
• Concerns about resources and tools in the public domain
• Public vs. private spaces within the tools
• Checking the legitimacy of usage and resource
  implications for an institution:
• Delays in decision making at
  organizational level
Social Media in Education
• Appropriateness of the content that is posted in the public
    domain or in the collaborative space of the initiative
•   „Policing‟ the content
•   Keeping the social networking „private‟
•   Adapting publically available tools
•   Controlling spam
•   Moderation of discussions
•   Position of the institution regarding endorsement of the
    tools in the public domain (Minocha, 2009).
Social Media in Education
  Attwell‟s prescription for reform is to “end the
  isolation of school from wider forms of community
  and knowledge sharing through such means as
  community learning centers, project-based
  learning, open educational resources, personal
  learning environments, mixed age learning, and
  assessment for learning as a tool for enhancing
  learning rather than assessment of learning as a
  final measure of outcomes.”
Social Media in Education

   Many, if not most, of these reforms would benefit
   from the application of Social media tools and
   would equip learners to make more effective use
   of such tools” (Albion, 2008; Atwell, 2007).
Some Literature
• Kaiser Family: Generation M2: Media in the Lives of 8- to 18-Year-
  Olds
  http://www.kff.org/entmedia/mh012010pkg.cfm
• Pew Research: Millennials a portrait of generation next
  http://pewresearch.org/millennials/
• Digital Youth Research: Living and learning with new media
  http://digitalyouth.ischool.berkeley.edu/report
• Nielsen: How Teens Use Media
  http://blog.nielsen.com/nielsenwire/reports/nielsen_howteensusemedi
  a_june09.pdf

More Related Content

What's hot

Social Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures PaperSocial Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures Papermartindudziak
 
Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image S...
Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image S...Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image S...
Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image S...Anne Arendt
 
Creative Commons for Tertiary Education
Creative Commons for Tertiary EducationCreative Commons for Tertiary Education
Creative Commons for Tertiary EducationMattMcGregor
 
Diversity and Inclusion in STEM Education - Milton Chen
Diversity and Inclusion in STEM Education - Milton ChenDiversity and Inclusion in STEM Education - Milton Chen
Diversity and Inclusion in STEM Education - Milton ChenSTEM Summit
 
Digital Divide Dichotomy Dissected
Digital Divide Dichotomy DissectedDigital Divide Dichotomy Dissected
Digital Divide Dichotomy Dissectedbocretion
 
Copyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part IIICopyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part IIIRenee Hobbs
 
Creative commons for Schools
Creative commons for SchoolsCreative commons for Schools
Creative commons for SchoolsMattMcGregor
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
People Media ( Media and Information Literacy for Grade 11)
People Media ( Media and Information Literacy for Grade 11)People Media ( Media and Information Literacy for Grade 11)
People Media ( Media and Information Literacy for Grade 11)Reah_dulana
 
Gender Digital Divide
Gender Digital DivideGender Digital Divide
Gender Digital Divideguest0747a9
 
Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011Emporia State University
 
The digital participation gap
The digital participation gapThe digital participation gap
The digital participation gapwilthenarwhal
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000nielson900
 
Copyright & Plaigarism 2009
Copyright & Plaigarism 2009Copyright & Plaigarism 2009
Copyright & Plaigarism 2009zottnick
 
Digital Inclusion and Techno-Capital in Austin, Texas
Digital Inclusion and Techno-Capital in Austin, TexasDigital Inclusion and Techno-Capital in Austin, Texas
Digital Inclusion and Techno-Capital in Austin, TexasChris McConnell
 

What's hot (19)

Social Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures PaperSocial Network Continuity Disruption Countermeasures Paper
Social Network Continuity Disruption Countermeasures Paper
 
Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image S...
Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image S...Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image S...
Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image S...
 
Article 1
Article 1Article 1
Article 1
 
Creative Commons for Tertiary Education
Creative Commons for Tertiary EducationCreative Commons for Tertiary Education
Creative Commons for Tertiary Education
 
Diversity and Inclusion in STEM Education - Milton Chen
Diversity and Inclusion in STEM Education - Milton ChenDiversity and Inclusion in STEM Education - Milton Chen
Diversity and Inclusion in STEM Education - Milton Chen
 
Child grooming
Child groomingChild grooming
Child grooming
 
Digital Divide Dichotomy Dissected
Digital Divide Dichotomy DissectedDigital Divide Dichotomy Dissected
Digital Divide Dichotomy Dissected
 
Copyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part IIICopyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part III
 
Creative commons for Schools
Creative commons for SchoolsCreative commons for Schools
Creative commons for Schools
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Digital Tattoo for NITEP students
Digital Tattoo for NITEP studentsDigital Tattoo for NITEP students
Digital Tattoo for NITEP students
 
People Media ( Media and Information Literacy for Grade 11)
People Media ( Media and Information Literacy for Grade 11)People Media ( Media and Information Literacy for Grade 11)
People Media ( Media and Information Literacy for Grade 11)
 
Gender Digital Divide
Gender Digital DivideGender Digital Divide
Gender Digital Divide
 
Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011
 
The digital participation gap
The digital participation gapThe digital participation gap
The digital participation gap
 
Lesson 1 Introduction to Media and Information Literacy
Lesson 1 Introduction to Media and Information LiteracyLesson 1 Introduction to Media and Information Literacy
Lesson 1 Introduction to Media and Information Literacy
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000
 
Copyright & Plaigarism 2009
Copyright & Plaigarism 2009Copyright & Plaigarism 2009
Copyright & Plaigarism 2009
 
Digital Inclusion and Techno-Capital in Austin, Texas
Digital Inclusion and Techno-Capital in Austin, TexasDigital Inclusion and Techno-Capital in Austin, Texas
Digital Inclusion and Techno-Capital in Austin, Texas
 

Viewers also liked

Social Media In Higher Education
Social Media In Higher EducationSocial Media In Higher Education
Social Media In Higher EducationLeader Networks
 
A Higher Education Social Media Case Study
A Higher Education Social Media Case StudyA Higher Education Social Media Case Study
A Higher Education Social Media Case StudyRod P. Yabut
 
Social Media & Digital Tools in Education
Social Media & Digital Tools in EducationSocial Media & Digital Tools in Education
Social Media & Digital Tools in EducationLucy Martin
 
Ologie: Social Media & Higher Education
Ologie: Social Media & Higher EducationOlogie: Social Media & Higher Education
Ologie: Social Media & Higher EducationLeigh Householder
 
Social Media in Higher Education
Social Media in Higher EducationSocial Media in Higher Education
Social Media in Higher EducationJessie Baker
 
The role of social media in higher education
The role of social media in higher educationThe role of social media in higher education
The role of social media in higher educationSue Beckingham
 
Educational-leadership
Educational-leadershipEducational-leadership
Educational-leadershipAbdul Majid
 

Viewers also liked (10)

Social Media In Higher Education
Social Media In Higher EducationSocial Media In Higher Education
Social Media In Higher Education
 
A Higher Education Social Media Case Study
A Higher Education Social Media Case StudyA Higher Education Social Media Case Study
A Higher Education Social Media Case Study
 
Social Media & Digital Tools in Education
Social Media & Digital Tools in EducationSocial Media & Digital Tools in Education
Social Media & Digital Tools in Education
 
Ologie: Social Media & Higher Education
Ologie: Social Media & Higher EducationOlogie: Social Media & Higher Education
Ologie: Social Media & Higher Education
 
Engaging higher education tools via digital curation
Engaging higher education tools via digital curationEngaging higher education tools via digital curation
Engaging higher education tools via digital curation
 
5 stage model
5 stage model5 stage model
5 stage model
 
Social Media in Higher Education
Social Media in Higher EducationSocial Media in Higher Education
Social Media in Higher Education
 
Project-Based + Blended Learning
Project-Based + Blended LearningProject-Based + Blended Learning
Project-Based + Blended Learning
 
The role of social media in higher education
The role of social media in higher educationThe role of social media in higher education
The role of social media in higher education
 
Educational-leadership
Educational-leadershipEducational-leadership
Educational-leadership
 

Similar to Social media used in higher education

Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationAnne Arendt
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
effects of Social media
effects of Social mediaeffects of Social media
effects of Social mediakimi7792
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)John Bosco Javellana, MAEd.
 
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016Diana Benner
 
Carly finalproject 1
Carly finalproject 1Carly finalproject 1
Carly finalproject 1cjsaha01
 
EVERFI and Peter Lake - The Future of Diversity, Equity & Inclusion
EVERFI and Peter Lake - The Future of Diversity, Equity & InclusionEVERFI and Peter Lake - The Future of Diversity, Equity & Inclusion
EVERFI and Peter Lake - The Future of Diversity, Equity & InclusionKatie Mitchell
 
Magna dvd 3 case presentation
Magna dvd 3 case presentationMagna dvd 3 case presentation
Magna dvd 3 case presentationmyspacelibrarian
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
TAG Progress Presentation
TAG Progress PresentationTAG Progress Presentation
TAG Progress Presentationamethley
 
Code of Best Practices in Fair Use for Media Literacy Education
Code of Best Practices in Fair Use for Media Literacy EducationCode of Best Practices in Fair Use for Media Literacy Education
Code of Best Practices in Fair Use for Media Literacy EducationMichelle Cates
 
Legal&ethical presentation wk6_barnett
Legal&ethical presentation wk6_barnettLegal&ethical presentation wk6_barnett
Legal&ethical presentation wk6_barnettJohn Barnett
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social SideNatalie Alesi
 
Non-linear PP example
Non-linear PP exampleNon-linear PP example
Non-linear PP examplenaterator
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
 
Copyright And The Internet
Copyright And The InternetCopyright And The Internet
Copyright And The InternetTerriS
 
Resources: Media Literacy and Managing Misinformation
Resources: Media Literacy and Managing MisinformationResources: Media Literacy and Managing Misinformation
Resources: Media Literacy and Managing MisinformationDamian Radcliffe
 

Similar to Social media used in higher education (20)

Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
effects of Social media
effects of Social mediaeffects of Social media
effects of Social media
 
Hobbs and valenza 4.6.11
Hobbs and valenza 4.6.11Hobbs and valenza 4.6.11
Hobbs and valenza 4.6.11
 
Comm Law paper
Comm Law paperComm Law paper
Comm Law paper
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)
 
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
 
Carly finalproject 1
Carly finalproject 1Carly finalproject 1
Carly finalproject 1
 
EVERFI and Peter Lake - The Future of Diversity, Equity & Inclusion
EVERFI and Peter Lake - The Future of Diversity, Equity & InclusionEVERFI and Peter Lake - The Future of Diversity, Equity & Inclusion
EVERFI and Peter Lake - The Future of Diversity, Equity & Inclusion
 
Magna dvd 3 case presentation
Magna dvd 3 case presentationMagna dvd 3 case presentation
Magna dvd 3 case presentation
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
TAG Progress Presentation
TAG Progress PresentationTAG Progress Presentation
TAG Progress Presentation
 
Current Issue Paper
Current Issue PaperCurrent Issue Paper
Current Issue Paper
 
Code of Best Practices in Fair Use for Media Literacy Education
Code of Best Practices in Fair Use for Media Literacy EducationCode of Best Practices in Fair Use for Media Literacy Education
Code of Best Practices in Fair Use for Media Literacy Education
 
Legal&ethical presentation wk6_barnett
Legal&ethical presentation wk6_barnettLegal&ethical presentation wk6_barnett
Legal&ethical presentation wk6_barnett
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Non-linear PP example
Non-linear PP exampleNon-linear PP example
Non-linear PP example
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
Copyright And The Internet
Copyright And The InternetCopyright And The Internet
Copyright And The Internet
 
Resources: Media Literacy and Managing Misinformation
Resources: Media Literacy and Managing MisinformationResources: Media Literacy and Managing Misinformation
Resources: Media Literacy and Managing Misinformation
 

More from Anne Arendt

ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16Anne Arendt
 
Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Anne Arendt
 
Technology, Higher Education, and Open Access
Technology, Higher Education, and Open AccessTechnology, Higher Education, and Open Access
Technology, Higher Education, and Open AccessAnne Arendt
 
Creation of a Statewide Survey of Incentives and Disincentives
Creation of a Statewide Survey of Incentives and DisincentivesCreation of a Statewide Survey of Incentives and Disincentives
Creation of a Statewide Survey of Incentives and DisincentivesAnne Arendt
 
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...Anne Arendt
 
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Anne Arendt
 
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Anne Arendt
 
How to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsHow to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsAnne Arendt
 
OER and OCW Use in the Basic Compositon
OER and OCW Use in the Basic CompositonOER and OCW Use in the Basic Compositon
OER and OCW Use in the Basic CompositonAnne Arendt
 
How to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsHow to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsAnne Arendt
 
Using Open Educational Resources in the Basic Composition Classroom
Using Open Educational Resources in the Basic Composition ClassroomUsing Open Educational Resources in the Basic Composition Classroom
Using Open Educational Resources in the Basic Composition ClassroomAnne Arendt
 
Open Educational Resources (OER) and OpenCourseWare (OCW)
Open Educational Resources (OER) and OpenCourseWare (OCW)Open Educational Resources (OER) and OpenCourseWare (OCW)
Open Educational Resources (OER) and OpenCourseWare (OCW)Anne Arendt
 
Web 2.0 at UVU: What it is and why it matters
Web 2.0 at UVU: What it is and why it mattersWeb 2.0 at UVU: What it is and why it matters
Web 2.0 at UVU: What it is and why it mattersAnne Arendt
 

More from Anne Arendt (13)

ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16
 
Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)
 
Technology, Higher Education, and Open Access
Technology, Higher Education, and Open AccessTechnology, Higher Education, and Open Access
Technology, Higher Education, and Open Access
 
Creation of a Statewide Survey of Incentives and Disincentives
Creation of a Statewide Survey of Incentives and DisincentivesCreation of a Statewide Survey of Incentives and Disincentives
Creation of a Statewide Survey of Incentives and Disincentives
 
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
 
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
 
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
 
How to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsHow to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative Commons
 
OER and OCW Use in the Basic Compositon
OER and OCW Use in the Basic CompositonOER and OCW Use in the Basic Compositon
OER and OCW Use in the Basic Compositon
 
How to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsHow to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative Commons
 
Using Open Educational Resources in the Basic Composition Classroom
Using Open Educational Resources in the Basic Composition ClassroomUsing Open Educational Resources in the Basic Composition Classroom
Using Open Educational Resources in the Basic Composition Classroom
 
Open Educational Resources (OER) and OpenCourseWare (OCW)
Open Educational Resources (OER) and OpenCourseWare (OCW)Open Educational Resources (OER) and OpenCourseWare (OCW)
Open Educational Resources (OER) and OpenCourseWare (OCW)
 
Web 2.0 at UVU: What it is and why it matters
Web 2.0 at UVU: What it is and why it mattersWeb 2.0 at UVU: What it is and why it matters
Web 2.0 at UVU: What it is and why it matters
 

Recently uploaded

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Recently uploaded (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

Social media used in higher education

  • 1. SOCIAL MEDIA USED IN HIGHER EDUCATION Anne Arendt
  • 2. Sample Timeline 1. Wikipedia (online encyclopedia) 2001; 2. del.icio.us (social bookmarking) 2003; 3. MySpace 2003 (social networking); 4. Facebook (social networking) 2004; 5. Flikr (social media) 2004; and 6. YouTube (social media) 2005 (Higher Education Academy and the Joint Information Systems Committee).
  • 3. Let‟s Check Some Statistics • http://www.pewinternet.org/ • http://www.jisc.ac.uk/ • http://www.internetworldstats.com/ • http://www.census.gov/ • http://searchenginewatch.com/ • http://www.google.com/publicdata/directory
  • 4. 8 to 18 Year Olds in the U.S. Today, 8-18 year-olds devote an average of 7 hours and 38 minutes (7:38) to using entertainment media across a typical day (more than 53 hours a week). And because they spend so much of that time „media multitasking‟ they actually manage to pack a total of 10 hours and 45 minutes (10:45) worth of media content into those 7½ hours. http://www.kff.org/entmedia/entmedia012010nr.cfm
  • 5. Possible Roles • Social-based learning – students want to leverage emerging communications and collaboration tools to create and personalize networks of experts to inform their education process. • Un-tethered learning – students envision technology-enabled learning experiences that transcend the classroom walls and are not limited by resource constraints, traditional funding streams, geography, community assets or even teacher knowledge or skills. • Digitally-rich learning – students see the use of relevancy- based digital tools, content and resources as a key to driving learning productivity, not just about engaging students in learning. • Source: http://www.tomorrow.org/speakup/pdfs/SUNationalFindings2009.pdf
  • 6. Types of Space • Secret/private/personal space: eg Short Message Service (SMS); Instant Message (IM) • group space: eg Bebo, Facebook • publishing space: eg blogs, wikis, YouTube • performance space: eg Second Life, World of Warcraft • participation space: eg meetings, markets, events • watching space: eg lectures (Locke 2007)
  • 7. Generational The consequences of this generation‟s experience have become increasingly apparent over time: • a strong sense of a community linked in its own virtual spaces of blogs and social networking and gaming sites; • a similarly strong sense of group identity; and • a disposition to share and to participate.
  • 8. Generational They also include: • impatience – a preference for instant answers; • a downgrading of text in favor of image; and • a casual approach to evaluating information and attributing it, and also to copyright and legal constraints” (Higher Education Academy and the Joint Information Systems Committee, 2009).
  • 9. Scenario: Boundaries • In [BCU2], the students admitted that the Facebook group set up for pre-induction was useful but they did not want university interactions in Facebook to continue once they had joined the university. • In contrast, in [ARU] and in [LSBU], the educators were allowed access to their students‟ profiles on Facebook but in [UM], some students were hesitant about interacting with their educators on Facebook as they perceived Facebook as a social space rather than an academic space (Minocha, 2009). Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education-finalreport.pdf
  • 10. FREEDOM OF SPEECH/EXPRESSION • Freedom of speech (expression) in the United States is protected by the First Amendment to the United States Constitution and by many state constitutions and state and federal laws. • The First Amendment to the United States Constitution is part of the Bill of Rights and was adopted in 1791.
  • 11. Freedom of Expression • It provides that: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.
  • 12. Freedom of Expression • The right to freedom of speech is recognized as a human right under Article 19 of the Universal Declaration of Human Rights (UDHR) and recognized in international human rights law in the International Covenant on Civil and Political Rights (ICCPR). • UDHR: Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
  • 13. Scenario Joseph Frederick was 18 when he unveiled the 14-foot paper sign on a public sidewalk outside his Juneau, Alaska, high school in 2002 and was suspended due to it. Frederick sued, claiming his constitutional rights to free speech were violated. Morse v. Frederick, 551 U.S. 393 (2007)
  • 14. Morse v. Fredrick • Joseph Frederick was suspended in 2002 for displaying a sign saying "Bong Hits 4 Jesus" at a rally for the Olympic torch relay. The rally was an off-campus event not sponsored by Frederick's school. A federal appeals court agreed with the ACLU that the school had violated Frederick's right to free speech. The Supreme Court heard the case during the 2006 term and ruled that Alaska public school officials did not violate Joseph Frederick's free speech rights by punishing him.
  • 15. Morse v. Fredrick • The Supreme Court decision did not resolve all of the issues in the case. Frederick claimed his speech rights under the Constitution of Alaska were violated, and the issue was argued in front of the Court of Appeals in September 2008. However, the school district agreed to settle out of court before the judges reached a decision. In November 2008, the district paid Frederick $45,000 to settle all remaining claims and agreed to hire a neutral constitutional law expert to lead a forum on student speech at Juneau-Douglas High School by the end of the school year.
  • 16. Freedom of Expression Questions to ask yourself: • Would a similar situation on the Internet have the same impact? Why or why not? • What about the Tinker v DesMoines case where the Supreme Court said, “young people do not "shed their constitutional rights at the schoolhouse gate," ruling that students have the right to free speech at school, as long as their speech does not disrupt the educational process. • What does right to free speech mean?
  • 17. GENERAL PERMISSIONS • As JISC Legal notes, “the variables which are likely to require consideration by the institution in drawing up its [Web 2.0] policy are: • Whether the institution, in general terms, supports the use of Web 2.0 technologies • Whether permission extends to both internally and externally hosted Web 2.0 services • Whether permission extends to all areas of business (teaching, research and administration) and to all members of staff • What formalities will be imposed by your institution on the use of Web 2.0 technologies (JISC Legal, 2008a)
  • 18. COPYRIGHT AND INTELLECTUAL PROPERTY • Generally speaking, we have well established rules and norms for individual, joint, institutional and vendor IP ownership. We also have reasonably well established academic norms for attribution. However, the devil is in the details (Cate, 2009). • We can now distribute rights almost any way we want to distribute them. • Copyright and intellectual property policy and enforcement includes a number of areas such as patents, trademarks, trade secrets, right of publicity, and copyrights.
  • 19. Copyright and IP • Copyright is a form of protection provided by the laws of the United States (title 17, U. S. Code) to the authors of “original works of authorship,” including literary, dramatic, musical, artistic, and certain other intellectual works. This protection is available to both published and unpublished works.
  • 20. Copyright and IP • Fair Use: • Section 107 contains a list of the various purposes for which the reproduction of a particular work may be considered fair, such as criticism, comment, news reporting, teaching, scholarship, and research.
  • 21. Copyright and IP Section 107 also sets out four factors to be considered in determining whether or not a particular use is fair: 1. The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes 2. The nature of the copyrighted work 3. The amount and substantiality of the portion used in relation to the copyrighted work as a whole 4. The effect of the use upon the potential market for, or value of, the copyrighted work
  • 22. Scenario In [SC], students were uncomfortable about uploading on Flickr the photographs they were taking on the course as they felt that they had no control about who was looking at the photographs and using them. The concern about sharing resources was raised particularly where students were asked to share reflections with a group of people who were potentially going to comment on what had been written; commenting on others‟ reflections was also considered uncomfortable by the students [UL] (Minocha, 2009). Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education-finalreport.pdf
  • 23. CREATIVE COMMONS & THE PUBLIC DOMAIN • Tools that release or selectively release copyright are gaining a foothold. One example of this is the Creative Commons. • Before we start, let‟s remind ourselves what attribution is. It is the ascribing of a work (as of literature or art) to a particular author or artist (Merriam-Webster).
  • 24. Creative Commons • http://www.creativecommons.org/ • Larry Lessig of Stanford is pursuing something called the Creative Commons which frees materials from automatically applied copyright restrictions by providing free, easy-to-use, flexible licenses for creators to place on their digital materials that permit the originator to grant rights as they see fit (Fitzergerald, 2007; Smith & Casserly, 2006).
  • 25. Creative Commons • There are six major licenses of the Creative Commons: • Attribution (CC-BY) • Attribution Share Alike (CC-BY-SA) • Attribution No Derivatives (CC-BY-ND) • Attribution Non-Commercial (CC-BY-NC) • Attribution Non-Commercial Share Alike (CC-BY-NC-SA) • Attribution Non-Commercial No Derivatives (CC-BY-NC-ND) • New! Now also CC0 with no attribution See http://creativecommons.org
  • 26. Creative Commons - ccLearn • ccLearn, a subset of Creative Commons, focuses specifically on open learning and open educational resources. • Learn more at http://learn.creativecommons.org
  • 27. PRIVACY, DATA PROTECTION AND FREEDOM OF INFORMATION • In considering privacy, data protection, and freedom of information laws, we need to consider normative and ethical issues as well as legal ones.
  • 28. Privacy and Data Protection • Privacy: Privacy is defined using Article 12 of the Universal Declaration of Human Rights (UDHR) and Article 17 of the International Covenant on Civil and Political Rights (ICCPR): • UDHR: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.
  • 29. Privacy and Data Protection As JISC Legal notes, “Many web 2.0 technologies place users at a point where submission of personal data is necessary to use the tool. This brings with it risks concerning the privacy and personal data of individuals” (JISC Legal, 2008b). This causes a number of data protection and freedom of information issues.
  • 30. Privacy and Data Protection In essence, “Data protection law allows individuals to control the collection, use and transfer of personal information about them. There may be situations where the setting up of student accounts by staff on externally Web 2.0 sites is a transfer of personal data, which must be done in compliance with the relevant legislation” (JISC Legal, 2008a)
  • 31. Privacy and Data Protection • Some questions to ask ourselves: • What records does the activity generate for which institutions are responsible? • Do they contain data that carry obligations of confidentiality, limitations on use or disclosure, requirements for ready access/availability? • How and where are they maintained? • Can materials be accessed when needed for course and institutional purposes? • What do hosting sites do with the data created by course participants? • When are you or your students conducting human subjects research? (Cate, 2008).
  • 32. Scenario At [ARU] there was a concern about the open environment in Second Life where it is easy for avatars (other than the core team on the course) to wander in and disrupt the class. In [LSBU], there is a mix of open and closed spaces. A space where academic work was available was open to the general public in order to give the students‟ work greater exposure, as were students‟ blogs. On the social network however, a closed group was used in order to ensure the privacy of students‟ profiles and postings from educators (Minocha, 2009). Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education-finalreport.pdf
  • 33. ACCESSIBILITY • Telecommunications Act –Section 255 (http://www.fcc.gov/cgb/consumerfacts/section255.html ) • Rehabilitation Act - U.S. Section 508 (http://www.section508.gov/ ) • Americans with Disabilities Act (ADA) (http://www.usdoj.gov/crt/ada/ )
  • 34. Scenario • iTunesU, Apples‟ was not accessible to the blind until September of 2008. “John Olivera of the Massachusetts Commission for the Blind said the state approached Apple for help in making the wealth of educational material in iTunes U available to blind students” (McLean, 2008). Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education- finalreport.pdf
  • 35. LIABILITY There are three types of liability issue which should be taken into account in relation to an institution‟s use of Web 2.0 technologies: 1. Contract based liability due to breach of contract 2. Negligence based liability due to failure to meet the required standard of care 3. Specific liabilities such as for defamatory or obscene content
  • 36. Scenario Several institutions used software that had a facility for the community itself to „police‟ the content, and to report inappropriate usage. At [UW], the ability for the Elgg based social network to be monitored by the users was perceived as a benefit. In [OU1], the course team took the decision to build a „report abuse‟ button, which users could use to identify inappropriate images or comments in OpenStudio. This was used occasionally, but „in the cases where it was used the images were found not be inappropriate in the context of the course. Actively moderating images with a course of this scale would have been too difficult.‟ (Minocha, 2009) Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education-finalreport.pdf
  • 37. RELIANCE ON AN EXTERNALLY PROVIDED SERVICE Dr Chris Adie, at the University of Edinburgh, suggested the following to be examined in relation to the assurance of service that an institution might require: 1. “The Security of the Service Provider” For how long can the external Web 2.0 service provider be expected to be around?
  • 38. Reliance 2. “Confidentiality” To what extent does the service provider respect the protection of information where appropriate (such as personal data, sensitive information about the institution‟s business, or confidential information – in relation to a patentable invention, for example). 3. “Ownership of Data” To what extent (if any) does the Web 2.0 service provider claim ownership of submissions and contributions?
  • 39. Reliance 4. “Security of Data” In addition to the matters noted under confidentiality above, there is the question of the safety of the data – both in terms of back-up, and in terms of unauthorized access. 5. “Performance” To what extent does the service provider agree to a particular standard of performance, and is there any possible remedy if that standard isn‟t met? 6. “Reliability” To what extent is the service stable and resilient? How often will it not be available?
  • 40. Reliance 7. “Support” How good are the reference sources of help, and the interactive assistance (such as a helpdesk)? 8. “Single Sign-On” To what extent can use of the Web 2.0 service be included under the standard institutional sign-on? 9. “Lock-in” To what extent legally (due to contractual obligations) and technically (due to compatibility) would the institution be tied-in to a particular technology?
  • 41. Reliance 10. “Longevity” What is the service provider‟s policy on maintaining unused accounts and data? 11. “Functional Stability” To what extent is the provision of the service likely to change over time? (Adie, 2007)
  • 42. Reliance Questions to ask ourselves: • What are terms of jurisdiction? • Whose law applies? • What authority does faculty have in contracting with third parties? • If individual faculty sign for themselves and dispute arises from use, is the institution liable and bound by the agreement? • If not, can it defend/indemnify faculty member? (Cate, 2009)
  • 43. Scenario In [LSBU], one student‟s account on Facebook was terminated, resulting in the loss of her academic work on Facebook. Project teams found that they could not control the registration of users. As a result, educators may not able to provide support to students who have lost their password or forgotten their user id. For example, in [SC] some Flickr user ids were abandoned because of this. In the future, projects may be able to look to initiatives such as OpenID () to provide some level of commonality for account management (Minocha, 2009 ). Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education-finalreport.pdf
  • 44. SOCIAL BOOKMARKING (FOLKSONOMY) • DEMO: Social Bookmarking http://del.icio.us • Social bookmarking sites work to build communities of users based on their decision to link to, cite, and otherwise reference specific websites, journals, and other resources.
  • 45. Scenario In [SU], the students were asked to annotate their entries onto a social bookmarking website with their names. Some of the students were not willing to do this, which meant that some entries were anonymous. This had implications for checking a student‟s involvement and progress with the course. Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education- finalreport.pdf
  • 46. SOCIAL NETWORKING AND PROFILES • DEMO: Facebook http://www.facebook.com/ • A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others.
  • 47. Social Networking • Questions to ask ourselves: • What issues arise if a faculty in a traditional class chooses to put all of his/her supplemental course materials on Facebook (or a similar platform)? • What if the instructor requires a Facebook account to view the information? • What if the instructor does not require a Facebook account to view the information?
  • 48. Scenario Educators and organizations face the dilemmas about whether, and to what extent communications in social networking sites should be moderated (eg [RH]), and what, if any, interventions should be undertaken. Institutions face the dilemma of policing the content versus leaving the discussions to take their own course (and thus to encourage participation, especially when the social software initiative has been set up to collect requirements and opinions [RH] (Minocha, 2009). Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education-finalreport.pdf
  • 49. BLOGS • DEMO: WordPress Blog http://www.wordpress.com/ • A blog (a contraction of the term "weblog") is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Often end-users can respond directly, and publically, to Blog postings.
  • 50. Blogs Risks associated with defamatory or obscene content include: • Blog contributors publishing defamatory materials could make institution liable by association • Inadequate “notice and take down” procedures for offending material • Potential damage to institutional reputation (JISC, 2008b).
  • 51. Scenario Students were working in schools, and were told not to use of the names of the schools, pupils or teachers in their blog entries. However some students did not follow this guidance. The blog was private, however if it had been open to the public domain this could have had serious implications for the university. In [UW], one student raised a personal issue related to health online. Staff felt that it was a private issue and was not appropriate for discussion in a public place and removed the post. In [UM] students were advised about online privacy and safety guidelines (Minocha, 2009). Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education-finalreport.pdf
  • 52. Open Educational Resources DEMO: Open Educational Resources http://search.creativecommons.org/ Open Educational Resources include educational content intended for re-use by others at no cost. It includes course materials, syllabi, tests, video, and more. It can be used by anyone (self directed learners, students, faculty, whomever wishes) Samples: http://www.academicearth.com/ http://ocw.mit.edu/
  • 53. OPEN ACCESS JOURNALS & PUBLICATIONS • DEMO: Directory of Open Access Journals http://www.doaj.org/ • Open access journals are those that are scholarly journals publicly available at no cost to the end user.
  • 54. OA Journals • It is advised that users insure that the content has proper Creative Commons attribution for their needs. • If posting your own content publically it is advised you understand the applicable creative commons attributions • Additionally, if authors of published works are considering placing their materials on open access sites such as Selected Works, they need to ensure that the journal or place of publication does not retain copyrights that do not permit this.
  • 55. COLLABORATIVE & INTERACTIVE ENVIRONMENTS, INCLUDING WIKIS • Demo: Wiki http://www.wikipedia.com/ • The wiki serves the role of an information resource and as a publishing platform. This could create risks concerning the legal validity of the information contained in them (JISC Legal, 2008). Additionally, “Collaborative creations in wikis can involve a multitude of combinations in terms of the creators involved” (JISC Legal, 2008).
  • 56. Collaborative • Risks associated with adding content include: • Copying, adapting and communicating contents without permission • Adding, removing or altering material without permission • Inaccurate or misleading content • Difficulties identifying an author for subsequent changed treatment of content • Multiplicity of authors could lead to disputes over copyright ownership (JISC Legal, 2008).
  • 57. Scenario • The use of wikis highlighted students‟ concerns about shared production and editing each others‟ work [UH]. In the wiki, the „ownership‟ of contributions can be unclear, and perceptions of ownership can vary among group members (Minocha, 2009). Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education-finalreport.pdf
  • 58. DOCUMENT SHARING • DEMO: Google Docs or SlideShare • Document sharing sites allow you to share and collaborate online. • Examples: • http://docs.google.com • http://www.slideshare.com
  • 59. Document Sharing Questions to ask ourselves: • Who is the „owner‟ of the information, particularly if there is more than one editor? • Who is able to view this document or resource (group, individuals, public) and how? • Who has the ability to make this document public and how? • •If the information is being put on a third party site, what rights does the third party have regarding the content?
  • 60. MICROBLOGGING • DEMO: Twitter http://www.twitter.com • Micro blogging is a form of multimedia blogging that allows users to send brief text updates or micromedia such as photos or audio clips and publish them
  • 61. Scenario • If the Twitter accounts or blogs are kept private or open to only a few selected users, then there could be a negative impact on group dynamics (concerns in [PU]) as there will be limited communication.
  • 62. PHOTO & VIDEO SHARING & EDITING • DEMO: Flickr http://www.flickr.com/ • There are a multitude of sites that permit you to share images and videos. • Example: http://www.youtube.com
  • 63. Scenario • In [SC], students were uncomfortable about uploading on Flickr the photographs they were taking on the course as they felt that they had no control about who was looking at the photographs and using them (Minocha, 2009). Source: http://www.jisc.ac.uk/media/documents/projects/ effective-use-of-social-software-in-education-finalreport.pdf
  • 64. Social Media in Education Here are some ways in which Social media tools can be useful in the classroom: • Move students from searching for information to using and creating it • Incorporate multiple learning styles into student projects and research • Integrate 21st century skills into the curriculum
  • 65. Social Media in Education • Teach information literacy and participate in a networked public culture • Foster more collaboration with teachers, other students, and community • Share information (and labor) with colleagues • Encouraging creative expression, gain authentic audiences, and get useful feedback • Showcase or promote activities (Baumbach, 2009)
  • 66. Social Media in Education The seven highest-ranking priorities for social media use by district administrators were: 1. Keep students interested and engaged in school 2. Meet the needs of different kinds of learners 3. Develop critical thinking skills 4. Develop capabilities in students that can't be acquired through traditional methods 5. Provide alternative learning environments for students 6. Extend learning beyond the school day 7. Prepare students to be lifelong learners (CoSN, 2009).
  • 67. Social Media in Education Educational Goals of Social Software • Initiating new ways of learning • Recording group discussions • Giving control to students • Simulating work environments and providing transferable skills to the students • Peer-to-peer learning • Critiquing each other‟s work • Reflective learning
  • 68. Social Media in Education • Problem- and inquiry-based learning • Collation of resources • Skills Development • Team working and online collaboration skills • Organizing a virtual class • Immediate (instantaneous) support from the educator and fellow students • Creating a digital identity • Improving the effectiveness of face-to-face tutorials and seminars • Fostering community building and participation of students in university-wide initiatives • Social engagement
  • 69. Social Media in Education CONCERNS OF INSTITUTIONS, EDUCATIONS & STUDENTS OF USING TOOLS IN THE PUBLIC DOMAIN: • Students want to remain anonymous in the public domain • Data protection and privacy concerns • Concerns about the public nature of the social networking group • Lack of control over social software tools in the public domain
  • 70. Social Media in Education • Reliability of the service • Concerns about support from external companies • Concerns about resources and tools in the public domain • Public vs. private spaces within the tools • Checking the legitimacy of usage and resource implications for an institution: • Delays in decision making at organizational level
  • 71. Social Media in Education • Appropriateness of the content that is posted in the public domain or in the collaborative space of the initiative • „Policing‟ the content • Keeping the social networking „private‟ • Adapting publically available tools • Controlling spam • Moderation of discussions • Position of the institution regarding endorsement of the tools in the public domain (Minocha, 2009).
  • 72. Social Media in Education Attwell‟s prescription for reform is to “end the isolation of school from wider forms of community and knowledge sharing through such means as community learning centers, project-based learning, open educational resources, personal learning environments, mixed age learning, and assessment for learning as a tool for enhancing learning rather than assessment of learning as a final measure of outcomes.”
  • 73. Social Media in Education Many, if not most, of these reforms would benefit from the application of Social media tools and would equip learners to make more effective use of such tools” (Albion, 2008; Atwell, 2007).
  • 74. Some Literature • Kaiser Family: Generation M2: Media in the Lives of 8- to 18-Year- Olds http://www.kff.org/entmedia/mh012010pkg.cfm • Pew Research: Millennials a portrait of generation next http://pewresearch.org/millennials/ • Digital Youth Research: Living and learning with new media http://digitalyouth.ischool.berkeley.edu/report • Nielsen: How Teens Use Media http://blog.nielsen.com/nielsenwire/reports/nielsen_howteensusemedi a_june09.pdf