Searching for "bully"

media literacy backfire

Did Media Literacy Backfire?

Jan 5, 2017danah boyd

https://points.datasociety.net/did-media-literacy-backfire-7418c084d88d

Understanding what sources to trust is a basic tenet of media literacy education.

Think about how this might play out in communities where the “liberal media” is viewed with disdain as an untrustworthy source of information…or in those where science is seen as contradicting the knowledge of religious people…or where degrees are viewed as a weapon of the elite to justify oppression of working people. Needless to say, not everyone agrees on what makes a trusted source.

Students are also encouraged to reflect on economic and political incentives that might bias reporting. Follow the money, they are told. Now watch what happens when they are given a list of names of major power players in the East Coast news media whose names are all clearly Jewish. Welcome to an opening for anti-Semitic ideology.

In the United States, we believe that worthy people lift themselves up by their bootstraps. This is our idea of freedom. To take away the power of individuals to control their own destiny is viewed as anti-American by so much of this country. You are your own master.

Children are indoctrinated into this cultural logic early, even as their parents restrict their mobility and limit their access to social situations. But when it comes to information, they are taught that they are the sole proprietors of knowledge. All they have to do is “do the research” for themselves and they will know better than anyone what is real.

Combine this with a deep distrust of media sources.

Many marginalized groups are justifiably angry about the ways in which their stories have been dismissed by mainstream media for decades.It took five days for major news outlets to cover Ferguson. It took months and a lot of celebrities for journalists to start discussing the Dakota Pipeline. But feeling marginalized from news media isn’t just about people of color.

Keep in mind that anti-vaxxers aren’t arguing that vaccinations definitively cause autism. They are arguing that we don’t know. They are arguing that experts are forcing children to be vaccinated against their will, which sounds like oppression. What they want is choice — the choice to not vaccinate. And they want information about the risks of vaccination, which they feel are not being given to them. In essence, they are doing what we taught them to do: questioning information sources and raising doubts about the incentives of those who are pushing a single message. Doubt has become tool.

Addressing so-called fake news is going to require a lot more than labeling. It’s going to require a cultural change about how we make sense of information, whom we trust, and how we understand our own role in grappling with information. Quick and easy solutions may make the controversy go away, but they won’t address the underlying problems.

In the United States, we’re moving towards tribalism (see Fukuyama), and we’re undoing the social fabric of our country through polarization, distrust, and self-segregation.

++++++++++++++++++++++++++++++

boyd, danah. (2014). It’s Complicated: The Social Lives of Networked Teens (1 edition). New Haven: Yale University Press.
p. 8 networked publics are publics that are reconstructed by networked technologies. they are both space and imagined community.
p. 11 affordances: persistence, visibility, spreadability, searchability.
p. technological determinism both utopian and dystopian
p. 30 adults misinterpret teens online self-expression.
p. 31 taken out of context. Joshua Meyrowitz about Stokely Charmichael.
p. 43 as teens have embraced a plethora of social environment and helped co-create the norms that underpin them, a wide range of practices has emerged. teens have grown sophisticated with how they manage contexts and present themselves in order to be read by their intended audience.
p. 54 privacy. p. 59 Privacy is a complex concept without a clear definition. Supreme Court Justice Brandeis: the right to be let alone, but also ‘measure of th access others have to you through information, attention, and physical proximity.’
control over access and visibility
p. 65 social steganography. hiding messages in plain sight
p. 69 subtweeting. encoding content
p. 70 living with surveillance . Foucault Discipline and Punish
p. 77 addition. what makes teens obsessed w social media.
p. 81 Ivan Goldberg coined the term internet addiction disorder. jokingly
p. 89 the decision to introduce programmed activities and limit unstructured time is not unwarranted; research has shown a correlation between boredom and deviance.
My interview with Myra, a middle-class white fifteen-year-old from Iowa, turned funny and sad when “lack of time” became a verbal trick in response to every question. From learning Czech to trakc, from orchestra to work in a nursery, she told me that her mother organized “98%” of her daily routine. Myra did not like all of these activities, but her mother thought they were important.
Myra noted that her mother meant well, but she was exhausted and felt socially disconnected because she did not have time to connect with friends outside of class.
p. 100 danger
are sexual predators lurking everywhere
p. 128 bullying. is social media amplifying meanness and cruelty.
p. 131 defining bullying in a digital era. p. 131 Dan Olweus narrowed in the 70s bulling to three components: aggression, repetition and imbalance on power. p. 152 SM has not radically altered the dynamics of bullying, but it has made these dynamics more visible to more people. we must use this visibility not to justify increased punishment, but to help youth who are actually crying out for attention.
p. 153 inequality. can SM resolve social divisions?
p. 176 literacy. are today’s youth digital natives? p. 178 Barlow and Rushkoff p. 179 Prensky. p. 180 youth need new literacies. p. 181 youth must become media literate. when they engage with media–either as consumers or producers–they need to have the skills to ask questions about the construction and dissemination of particular media artifacts. what biases are embedded in the artifact? how did the creator intend for an audience to interpret the artifact, and what are the consequences of that interpretation.
p. 183 the politics of algorithms (see also these IMS blog entries https://blog.stcloudstate.edu/ims?s=algorithms) Wikipedia and google are fundamentally different sites. p. 186 Eli Pariser, The Filter Bubble: the personalization algorithms produce social divisions that undermine any ability to crate an informed public. Harvard’s Berkman Center have shown, search engines like Google shape the quality of information experienced by youth.
p. 192 digital inequality. p. 194 (bottom) 195 Eszter Hargittai: there are signifficant difference in media literacy and technical skills even within age cohorts. teens technological skills are strongly correlated with socio-economic status. Hargittai argues that many youth, far from being digital natives, are quite digitally naive.
p. 195 Dmitry  Epstein: when society frames the digital divide as a problem of access, we see government and industry as the responsible party for the addressing the issue. If DD as skills issue, we place the onus on learning how to manage on individuals and families.
p. 196 beyond digital natives

Palfrey, J., & Gasser, U. (2008). Born Digital: Understanding the First Generation of Digital Natives (1 edition). New York: Basic Books.

John Palfrey, Urs Gasser: Born Digital
Digital Natives share a common global culture that is defined not by age, strictly, but by certain attributes and experience related to how they interact with information technologies, information itself, one another, and other people and institutions. Those who were not “born digital’ can be just as connected, if not more so, than their younger counterparts. And not everyone born since, say 1982, happens to be a digital native.” (see also https://blog.stcloudstate.edu/ims/2018/04/15/no-millennials-gen-z-gen-x/

p. 197. digital native rhetoric is worse than inaccurate: it is dangerous
many of the media literacy skills needed to be digitally savvy require a level of engagement that goes far beyond what the average teen pick up hanging out with friends on FB or Twitter. Technical skills, such as the ability to build online spaces requires active cultivation. Why some search queries return some content before others. Why social media push young people to learn how to to build their own systems, versus simply using a social media platforms. teens social status and position alone do not determine how fluent or informed they are via-a-vis technology.
p. 199 Searching for a public on their own

++++++++++++

Daum, M. (2018, August 24). My Affair With the Intellectual Dark Web – Great Escape. Retrieved October 9, 2018, from https://medium.com/s/greatescape/nuance-a-love-story-ae6a14991059

the intellectual dark web

++++++++++++
more on media literacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=media+literacy

fake news in this IMS blog
https://blog.stcloudstate.edu/ims?s=fake+news

AI tracks students writings

Schools are using AI to track what students write on their computers

By Simone Stolzoff August 19, 2018
50 million k-12 students in the US
Under the Children’s Internet Protection Act (CIPA), any US school that receives federal funding is required to have an internet-safety policy. As school-issued tablets and Chromebook laptops become more commonplace, schools must install technological guardrails to keep their students safe. For some, this simply means blocking inappropriate websites. Others, however, have turned to software companies like GaggleSecurly, and GoGuardian to surface potentially worrisome communications to school administrators
In an age of mass school-shootings and increased student suicides, SMPs Safety Management Platforms can play a vital role in preventing harm before it happens. Each of these companies has case studies where an intercepted message helped save lives.
Over 50% of teachers say their schools are one-to-one (the industry term for assigning every student a device of their own), according to a 2017 survey from Freckle Education
But even in an age of student suicides and school shootings, when do security precautions start to infringe on students’ freedoms?
When the Gaggle algorithm surfaces a word or phrase that may be of concern—like a mention of drugs or signs of cyberbullying—the “incident” gets sent to human reviewers before being passed on to the school. Using AI, the software is able to process thousands of student tweets, posts, and status updates to look for signs of harm.
SMPs help normalize surveillance from a young age. In the wake of the Cambridge Analytica scandal at Facebook and other recent data breaches from companies like Equifax, we have the opportunity to teach kids the importance of protecting their online data
in an age of increased school violence, bullying, and depression, schools have an obligation to protect their students. But the protection of kids’ personal information is also a matter of their safety

+++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

more on surveillance  in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

Media Manipulation and Disinformation Online

A Review of ‘Media Manipulation and Disinformation Online’

In Media Manipulation and Disinformation Online, Marwick and Lewis (2017) of the Data & Society Research Institute described the agents of media manipulation, their modus operandi, motivators, and how they’ve taken advantage of the vulnerability of online media. The researchers described the manipulators as right-wing extremists (RWE), also known as alt-right, who run the gamut from sexists (including male sexual conquest communities) to white nationalists to anti-immigration activists and even those who rebuke RWE identification but whose actions confer such classification. These manipulators rally behind a shared belief on online forums, blogs, podcasts, and social media through pranks or ruinous trolling anonymity, usurping participatory culture methods (networking, humor, mentorship) for harassment, and competitive cyber brigades that earn status by escalating bullying such as the sharing of a target’s private information.

Marwick and Lewis reported on how RWE groups have taken advantage of certain media tactics to gain viewers’ attention such as novelty and sensationalism, as well as their interactions with the public via social media, to manipulate it for their agenda. For instance, YouTube provides any individual with a portal and potential revenue to contribute to the media ecosystem. The researchers shared the example of the use of YouTube by conspiracy theorists, which can be used as fodder for extremist networks as conspiracies generally focus on loss of control of important ideals, health, and safety.

One tactic they’re using is to package their hate in a way that appeals to millennials. They use attention hacking to increase their status such as hate speech, which is later recanted as trickster trolling all the while gaining the media’s attention for further propagation

SHARED MODUS OPERANDI

Marwick and Lewis reported the following shared tactics various RWE groups use for online exploits:

  • Ambiguity of persona or ideology,
  • Baiting a single or community target’s emotions,
  • Bots for amplification of propaganda that appears legitimately from a real person,
  • “…Embeddedness in Internet culture… (p. 28),”
  • Exploitation of young male rebelliousness,
  • Hate speech and offensive language (under the guise of First Amendment protections),
  • Irony to cloak ideology and/or skewer intended targets,
  • Memes for stickiness of propaganda,
  • Mentorship in argumentation, marketing strategies, and subversive literature in their communities of interest,
  • Networked and agile groups,
  • “…Permanent warfare… (p.12)” call to action,
  • Pseudo scholarship to deceive readers,
  • “…Quasi moral arguments… (p. 7)”
  • Shocking images for filtering network membership,
  • “Trading stories up the chain… (p. 38)” from low-level news outlets to mainstream, and
  • Trolling others with asocial behavior.

teenagers in Veles, Macedonia who profited around 16K dollars per month via Google’s AdSense from Facebook post engagements

a long history of mistrust with mainstream media

If you’re a college instructor of communications or teach digital literacy as a librarian, see the corresponding syllabus for this article. It provides discussion questions and assignments for teaching students about media manipulation. To teach your students how to combat fake news online, see my post on Navigating Post-Truth Societies: Strategies, Resources, and Technologies.

+++++++++
more on fake news in this iMS blog
https://blog.stcloudstate.edu/ims?s=fake+news

Incompetent Leader

The Most Common Type of Incompetent Leader

Scott Gregory  MARCH 30, 2018

https://hbr.org/2018/03/the-most-common-type-of-incompetent-leader

Researchers have studied managerial derailment — or the dark side of leadership — for many years. The key derailment characteristics of bad managers are well documented and fall into three broad behavioral categories: (1) “moving away behaviors,” which create distance from others through hyper-emotionality, diminished communication, and skepticism that erodes trust; (2) “moving against behaviors,” which overpower and manipulate people while aggrandizing the self; and (3) “moving toward behaviors,” which include being ingratiating, overly conforming, and reluctant to take chances or stand up for one’s team. The popular media is full of examples of bad leaders in government, academia, and business with these characteristics.

Absentee leadership rarely comes up in today’s leadership or business literature, but research shows that it is the most common form of incompetent leadership.

Absentee leaders are people in leadership roles who are psychologically absent from them. They were promoted into management, and enjoy the privileges and rewards of a leadership role, but avoid meaningful involvement with their teams. Absentee leadership resembles the concept of rent-seeking in economics — taking value out of an organization without putting value in. As such, they represent a special case of laissez-faire leadership, but one that is distinguished by its destructiveness.

Having a boss who lets you do as you please may sound ideal, especially if you are being bullied and micromanaged by your current boss. However, a 2015 survey of 1,000 working adults showed that eight of the top nine complaints about leaders concerned behaviors that were absent; employees were most concerned about what their bosses didn’t do.

Research shows that being ignored by one’s boss is more alienating than being treated poorly. The impact of absentee leadership on job satisfaction outlasts the impact of both constructive and overtly destructive forms of leadership. Constructive leadership immediately improves job satisfaction, but the effects dwindle quickly. Destructive leadership immediately degrades job satisfaction, but the effects dissipate after about six months. In contrast, the impact of absentee leadership takes longer to appear, but it degrades subordinates’ job satisfaction for at least two years. It also is related to a number of other negative outcomes for employees, like role ambiguityhealth complaints, and increased bullying from team members. Absentee leadership creates employee stress, which can lead to poor employee health outcomes and talent drain, which then impact an organization’s bottom line.

Because absentee leaders don’t actively make trouble, their negative impact on organizations can be difficult to detect, and when it is detected, it often is considered a low-priority problem. Thus, absentee leaders are often silent organization killers. Left unchecked, absentee leaders clog an organization’s succession arteries, blocking potentially more effective people from moving into important roles while adding little to productivity. Absentee leaders rarely engage in unforgivable bouts of bad behavior, and are rarely the subject of ethics investigations resulting from employee hotline calls. As a result, their negative effect on organizations accumulates over time, largely unchecked.

Constructive leadership creates high engagement and productivity, while destructive leadership kills engagement and productivity. 

+++++++++++++++
more on what makes “great leader” in this IMS blog

leader charts

digital self harm

When Teens Cyberbully Themselves

April 21, 2018 JULI FRAGA https://www.npr.org/sections/health-shots/2018/04/21/604073315/when-teens-cyberbully-themselves

Recent research and clinical psychologists now suggest that some adolescents are engaging in a newer form of self-aggression — digital self-harm. They’re anonymously posting mean and derogatory comments about themselves on social media.

According to a survey published late last year in the Journal of Adolescent Health, teens are bullying themselves online as a way to manage feelings of sadness and self-hatred and to gain attention from their friends.

“We were alarmed to learn that 6 percent of the youth who participated in our study engaged in some form of digital self-harm,” says Sameer Hinduja, co-author of the study and a professor of criminology at Florida Atlantic University. He is also the co-director of the Cyberbullying Research Center.

“Because teens’ online and offline worlds overlap, digital self-harm is a concern for some youth, making online self-harm an emerging area of research,” says, Susan Swearer, a professor of psychology at the University of Nebraska, Lincoln

Because the advent of social media has changed the way many teens form and experience relationships, normal adolescent feelings of insecurity, anxiety and loneliness can become magnified as they scroll through their peers’ social media reels. Hinduja says some teens cope with that distress by turning their angst on themselves online.

++++++++++++++
more on cyberbullying in this IMS blog
https://blog.stcloudstate.edu/ims?s=cyberbullying

more on digital citizenship in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+citizenship

challenges ed leaders technology

The Greatest Challenge Facing School Leaders in a Digital World

By Scott McLeod     Oct 29, 2017

https://www.edsurge.com/news/2017-10-29-the-greatest-challenge-facing-school-leaders-in-a-digital-world

the Center for the Advanced Study of Tech­nology Leadership in Education – CASTLE

Vision

If a school’s reputation and pride are built on decades or centuries of “this is how we’ve always done things here,” resistance from staff, parents, and alumni to significant changes may be fierce. In such institutions, heads of school may have to steer carefully between deeply ingrained habits and the need to modernize the information tools with which students and faculty work

Too often, when navigating faculty or parental resistance, school leaders and technology staff make reassurances that things will not have to change much in the classroom or that slow baby steps are OK. Unfortunately, this results in a different problem, which is that schools have now invested significant money, time, and energy into digital technologies but are using them sparingly and seeing little impact. In such schools, replicative uses of technology are quite common, but transformative uses that leverage the unique affordances of technology are quite rare.

many schools fail to proceed further because they don’t have a collective vision of what more transformative uses of technology might look like, nor do they have a shared understanding of and commitment to what it will take to get to such a place. As a result, faculty instruction and the learning experiences of students change little or not at all.

These schools have taken the time to involve all stakeholders—including students—in substantive conversations about what digital tools will allow them to do differently compared with previous analog practices. Their visions promote the potential of computing devices to facilitate all of those elements we now think of as essential 21st-century capacities: confidence, curiosity, enthusiasm, passion, critical thinking, problem-solving, and self-direction. Technology doesn’t simply support traditional teaching—it transforms it for deeper thinking and gives students more agency over their own learning.

Fear

Another prevalent issue preventing technology change in schools is fear—fear of change, of the unknown, of letting go of what we know best, of being learners again. But it’s also a fear of letting kids have wide access to the Internet with the possibility of cyberbullying, access to inappropriate material, and exposure to online predators or even excessive advertising. Fears, of course, need to be surfaced and addressed.

The fear drives some schools to ban cellphones, disallow students and faculty from using Facebook, and lock down Internet filters so tightly that useful websites are inaccessible. They prohibit the use of Twitter and YouTube, and they block blogs. Some educators see these types of responses as principled stands against the shortcomings and hassles of digital technologies. Others see them as rejections of the dehumanization of the education process by soulless machines. Often, however, it’s just schools clinging to the past and elevating what is comfortable or familiar over the potential of technology to help them better deliver on their school missions.

Heads of school don’t have to be skilled users themselves to be effective technology leaders, but they do have to exercise appropriate oversight and convey the message—repeatedly—that frequent, meaningful technology use in school is both important and expected. Nostalgia aside, there is no foreseeable future in which the primacy of printed text is not superseded by electronic text and multimedia. When nearly all information is digital or online, multi-modal and multi­media, accessed by mobile devices that fit in our pockets, the question should not be whether schools prepare students for a digital learning landscape, but rather how.

Control

Many educators aren’t necessarily afraid of technology, but they are so accustomed to heavily teacher-directed classrooms that they are leery about giving up control—and can’t see the value in doing so.

Although most of us recognize that mobile computers connected to the Internet may be the most powerful learning devices yet invented—and that youth are learning in powerful ways at home with these technologies—allowing students to have greater autonomy and ownership of the learning process can still seem daunting and questionable.

The “beyond” is particularly important. When we give students some voice in and choice about what and how they learn, we honor basic human needs for autonomy, we enhance students’ interest and engagement, and we truly actualize our missions of preparing lifelong learners.

The goal of instructional transformation is to empower students, not to disempower teachers. While instructor unfamiliarity with digital technologies, inquiry- or problem-based teaching techniques, or deeper learning strategies may result in some initial discomfort, these challenges can be overcome with robust support.

Support

A few workshops here and there rarely result in large-scale changes in implementation.

teacher-driven “unconferences” or “edcamps,” at which educators propose and facilitate discussion topics, can be powerful mechanisms for fostering professional dialogue and learning. Similarly, some schools offer voluntary “Tech Tuesdays” or “appy hours” to foster digital learning among interested faculty.

In addition to existing IT support, technology integration staff, or librarians/media specialists, some schools have student technology teams that are on call for assistance when needed.

A few middle schools and high schools go even further and assign teachers their own individual student technology mentors. These student-teacher pairings last all school year and comprise the first line of support for educators’ technology questions.

As teachers, heads of school, counselors, coaches, and librarians, we all now have the ability to participate in ongoing, virtual, global communities of practice.

Whether formal or informal, the focus of technology-related professional learning should be on student learning, not on the tools or devices. Independent school educators should always ask, “Technology for the purpose of what?” when considering the inclusion of digital technologies into learning activities. Technology never should be implemented just for technology’s sake.

++++++++++++
more on digital literacy for EDAD in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+literacy+edad

Big Tech in schools

Former Google Design Ethicist: Relying on Big Tech in Schools Is a ‘Race to the Bottom’

By Jenny Abamu     Feb 7, 2018

https://www.edsurge.com/news/2018-02-07-former-google-design-ethicist-relying-on-big-tech-in-schools-is-a-race-to-the-bottom

Common Sense Media recently partnered with the Center for Humane Technology, which supports the development of ethical technological tools, to lay out a fierce call for regulation and awareness about the health issues surrounding tech addiction.

Tristan Harris, a former ethicist at Google who founded the Center for Humane Technology

To support educators making such decisions, Common Sense Media is taking their “Truth about Tech” campaign to schools through an upgraded version of their current Digital Citizenship curriculum. The new updates will include more information on subjects such as:

  • Creating a healthy media balance and digital wellness;
  • Concerns about the rise of hate speech in schools, that go beyond talking about cyberbullying; and
  • Fake news, media literacy and curating your own content

What Does ‘Tech Addiction’ Mean?

In a recent NPR report, writer Anya Kamenetz, notes that clinicians are debating whether technology overuse is best categorized as a bad habit, a symptom of other mental struggles (such as depression or anxiety) or as an addiction.

Dr. Jenny Radesky, a developmental-behavioral pediatrician at the American Academy of Pediatrics, notes that though she’s seen solid evidence linking heavy media usage to problems with sleep and obesity, she hesitated to call the usage “addiction.”

Dr. Robert Lustig, an endocrinologist who studies hormones at the University of Southern California disagreed, noting that parents have to see the overuse of technology as an addiction.

Low Morale of Online Faculty

Here’s what some of the faculty who agreed to have their comments posted had to say about what lowers their morale:

  • Sean-David McGoran noted that students allowed to bully faculty, repetitious and unnecessary training and unreasonable deadlines at final and midterm examination time can be demoralizing.
  • Linda Chilson said that pay, curriculum that doesn’t make sense, student behavioral issues and school districts funding unnecessary training are issues, as well as lack of support for out of the box thinking.
  • Leah Murray noted that micromanaging every little detail is demoralizing – and understandably added, “why not teach the class yourself if you are going to pay that much attention“. She also noted that lack of positive reinforcement and others taking credit for work you did is troubling.
  • Mary Kay Westgate-Taylor cited poor new faculty orientation, unclear expectations, micromanagement and lack of support from administration regarding student issues as concerns.
  • Dr Steve Woodsmall noted open admissions – too many graduate students who aren’t able or willing to do graduate level work or have a sense of entitlement (paying tuition guaranteeing a degree) and complaining when they receive clearly deserved failing grades causes low morale.
  • Quiana Bradshaw noted that schools acting like adjuncts don’t matter causes low morale. Adjuncts often work hard with no promotional opportunities with no mentoring or encouragement, and only veteran individuals offered promotions. Not including adjuncts as part of the team or micromanaging adjuncts with reports and comments is concerning.
  • Jeanie Rogers-Street noted that education not being the driving force of education (instead, finances being the main focus) is a cause of low morale.
  • Christina Krepinevich Houston noted rude emails from supervisors as a cause of low morale.
  • Stacie Williams commented that supervisors or administrators with a lack of experience in curriculum design and hiring skills dismissing the experience and knowledge of instructors is demoralizing.
  • Traci Schneider Cull noted that not having support from online higher-ups or fixing issues in courses/not responding causes low morale.
  • Nicki Favero Puckett cited continuous increases in workload without additional compensation as a cause.
  • Terri Hennessy Craig stated that severely under, or unprepared, students and canceling classes (particularly without notice) is a cause of low morale.
  • Maria Toy noted micromanagement and an increased workload with no additional compensation as a low morale cause

++++++++++++++

this conversation continues in this LInkedIn discussion group: https://www.linkedin.com/groups/2774663/2774663-6341436320048648193

+++++++++++++++
more on online teaching in this IMS blog
https://blog.stcloudstate.edu/ims?s=online+teaching

safe social media

Tips Toward a Safe and Positive Social Media Experience

By Stephen Spengler 06/01/17

https://thejournal.com/articles/2017/06/01/tips-toward-a-safe-and-positive-social-media-experience.aspx

Family Online Safety Institute recommends that parents engage in “7 Steps to Good Digital Parenting”

1. Talk with your children.

2. Educate yourself.

3. Use parental controls. Check the safety controls on all of the Android and Apple devices that your family uses. On the iPhone, you can tap SETTINGS > GENERAL> RESTRICTIONS and you can create a password that allows you enable/disable apps and phone functions. On Android devices, you can turn on Google Play Parental Controls by going into the Google Play Store settings

parental monitoring software such as NetNanny, PhoneSherriff, Norton Family Premier and Qustodio.

4. Friend and follow your children on social media. Whether it’s musical.ly, Instagram or Twitter, chances are that your children use some form of social media. If you have not already, then create an account and get on their friends list.

5. Explore, share and celebrate.

6. Be a good digital role model.

7. Set ground rules and apply sanctions. Just like chore charts or family job lists, consider using a family social media or internet safety contract. These contracts establish ground rules for when devices are to be used; what they should and should not be doing on them; and to establish sanctions based on breaches of the family contract. A simple internet search for “family internet contract” or “family technology contract” will produce a wealth of available ideas and resources to help you implement rules and sanctions revolving around your family’s technology use. A good example of a social media contract for children can be found at imom.com/printable/social-media-contract-for-kids/.

Managing Your Digital Footprint

Your digital footprint, according to dictionary.com, is “one’s unique set of digital activities, actions, and communications that leave a data trace on the internet or on a computer or other digital device and can identify the particular user or device.” Digital footprints can be either passive or active. The passive digital footprint is created without your consent and is driven by the sites and apps that you visit. The data from a passive digital footprint could reveal one’s internet history, IP address, location and is all stored in files on your device without you knowing it. An active digital footprint is more easily managed by the user. Data from an active digital footprint shows social media postings, information sharing, online purchases and activity usage.

  • Search for yourself online
  • Check privacy settings.
  • Use strong passwords
  • Update software.
  • Maintain your device.
  • Think before you post

Keep These Apps on Your Radar

  • Afterschool (minimum age 17) – The Afterschool App was rejected twice from the major app stores due to complaints from parents and educators. It is a well-known app that promotes cyberbullying, sexting, pornography and is filled with references to drugs and alcohol.
  • Blue Whale (minimum age 10) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. It is a suicide challenge app that attempts to prod children into killing themselves.
  • BurnBook (minimum age 18) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. It is a completely anonymous app for posting text, photos, and audio that promote rumors about other people. It is a notorious for cyberbullying
  • Calculator% (minimum age 4) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. This is one of hundreds of “secret” calculator apps. This app is designed to help students hide photos and videos that they do not want their parents to see. This app looks and functions like a calculator, but students enter a “.”, a 4-digit passcode, and then a “.” again.
  • KIK (minimum age 17) – This is a communications app that allows anyone to be contacted by anyone and it 100 percent bypasses the device’s contacts list.
  • Yik Yak (minimum age 18) – This app is a location-based (most commonly schools) bulletin board app. It works anonymously with anyone pretending to be anyone they want. Many schools across the country have encountered cyberbullying and cyberthreats originating from this app.
  • StreetChat (minimum age 14) – StreetChat is a photo-sharing board for middle school, high school and college-age students. Members do not need to be a student in the actual school and can impersonate students in schools across the country. It promotes cyberbullying through anonymous posts and private messaging.
  • ooVoo (minimum age 13) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. ooVoo is one of the largest video and messages app. Parents should be aware that ooVoo is used by predators to contact underage children. The app can allow users to video chat with up to twelve people at one time.
  • Wishbone (girls) & Slingshot (boys) (minimum age 13) – Both are comparison apps that allow users to create polls, including ones that are not appropriate for children. Many of the users create polls to shame and cyberbully other children, plus there are inappropriate apps and videos that users are forced to watch via the app’s advertising engine.

+++++++++++++++++++

Texas Teen May Be Victim in ‘Blue Whale Challenge’ That Encourages Suicide

Isaiah Gonzalez, 15, found hanging from his closet after an apparent suicide, as allegedly instructed by macabre online game

http://www.rollingstone.com/culture/news/texas-teen-latest-victim-in-challenge-that-promotes-suicide-w491939

Nationally, the Associated Press reports that educators, law enforcement officers and parents have raised concerns about the challenge, though these two back-to-back deaths mark the first allegations in the United States about deaths directly linked to the online game. Internationally, suicides in Russia, Brazil, and half a dozen other countries have already been linked to the challenge.

++++++++++++++++++++
more on social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education

Effective Social Media Policy

Status update: How to have a strong and effective social media policy

Employment Update (Australia) y:Brett FelthamLauren Crossman

https://www.dlapiper.com/en/dubai/insights/publications/2016/02/a-strong-and-effective-social-media-policy/

The top ten priorities for strong and effective social media policies should be:

explaining the risks that can arise through the use of social media and the reasons why having a policy is necessary;

clarifying the permitted uses of social media during work hours and/or using the employer’s resources. This will include when employees are allowed to access social media at work (if at all), when such access is permitted – for example, during an employee’s lunch hour or while the employee is on a break, or at any time – and what will be considered to be excessive use;

confirming that the policy applies in respect of social media use by an employee outside of work hours where that use impacts on the employer or the workplace, including by an employee publishing comments which are referable (whether directly or indirectly) to the employer, its products, other employees, customers, partners, suppliers or competitors;

clarifying prohibited uses of social media, such as an employee engaging in online conduct which may constitute unlawful discrimination, defamation, bullying or harassment. There needs to be careful consideration of how this part of the policy links to an employer’s other existing policies covering those issues. Consideration can also be given to requiring employees to inform their employer when they become aware of any potential breach of the policy by another employee – unlike in other jurisdictions, this concept of “dobbing in” a colleague can be difficult to promote in Australian workplaces;

confirming that social media use must be consistent with an employee’s obligations to comply with all applicable laws, including to not make any comment that may be misleading or deceptive in trade or commerce (in breach of Competition and Consumer Act 2010 (Cth)), and to not disclose any market sensitive information prior to disclosure by the employer (in breach of insider trading laws);

reminding employees of their obligations in respect of the employer’s confidential information and intellectual property, and privacy, copyright and plagiarism issues more generally;

where an employee is subject to a workplace investigation, in addition to requiring an employee to generally assist with that investigation, specifically directing an employee to preserve and not delete relevant social media content, and to provide their employer with reasonable access to that content for the purposes of the investigation;

specifically providing the employer the ability to direct an employee to remove or delete prohibited content;

expressly stating that breach of the policy may result in disciplinary action up to and including termination of employment; and

directing an employee on how they can notify their online connections of their departure from their employer and their acceptance of a new role, and confirming that the inappropriate use of those social media connections can constitute a breach of any post-termination restrictions on soliciting clients.

Need Sample Social Media Policies? Here Are 7 to Inspire Yours

1 2 3 4