Searching for "social media students"

academic libraries and social media

Howard, H. A. (2018). Academic Libraries on Social Media: Finding the Students and the Information They Want. Information Technology and Libraries, 37(1), 8–18. https://doi.org/10.6017/ital.v37i1.10160
https://ejournals.bc.edu/ojs/index.php/ital/article/view/10160
In his book Tell Everyone: Why We Share and Why It Matters, Alfred Hermida states, “People are not hooked on YouTube, Twitter or Facebook but on each other. Tools and services come and go; what is constant is our human urge to share.”1 Libraries are places of connection, where people connect with information, technologies, ideas, and each other. As such, libraries look for ways to increase this connection through communication.
Academic libraries have been slow to accept social media as a venue for either promoting their services or academic purposes. A 2007 study of 126 academic librarians found that only 12 percent of those surveyed “identified academic potential or possible benefits” of Facebook while 54 percent saw absolutely no value in social media.2 However, the mission of academic libraries has shifted in the last decade from being a repository of knowledge to being a conduit for information literacy; new roles include being a catalyst for on-campus collaboration and a facilitator for scholarly publication within contemporary academic librarianship.3 Academic librarians have responded to this change, with many now believing that “social media, which empowers libraries to connect with and engage its diverse stakeholder groups, has a vital role to play in moving academic libraries beyond their traditional borders and helping them engage new stakeholder groups.”4
The project focused on three research questions:
1. What social media platforms are students using?
2. What social media platforms do students want the library to use?
3. What kind of content do students want from the library on each of these platforms?
survey using the web-based Qualtrics
The social media platforms included were Facebook, Flickr, G+, Instagram, LinkedIn, Pinterest, Qzone, Renren, Snapchat, Tumblr, Twitter, YouTube, and Yik Yak
The second survey also lasted for three weeks starting in mid-April of the spring 2017 semester. As a participation incentive, students who completed the initial survey and the second survey had an opportunity to enter a drawing for a $25 Visa gift card.Library social media follows
Library social media presence
we intend to develop better communication channels, a clear social media presence, and a more cohesive message across the Purdue libraries. Under the direction of our new director of strategic communication, a social media committee was formed with representatives from each of the libraries to contribute content for social media. The committee will consider expanding the Purdue Libraries’ social media presence to communication channels where students have said they are and would like us to be.
+++++++++++++
More on social media and libraries in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+libraries

ECAR Study of Undergraduate Students and Information Technology, 2017

ECAR Study of Undergraduate Students and Information Technology, 2017

  • Students would like their instructors to use more technology in their classes.Technologies that provide students with something (e.g., lecture capture, early-alert systems, LMS, search tools) are more desired than those that require students to give something (e.g., social media, use of their own devices, in-class polling tools). We speculate that sound pedagogy and technology use tied to specific learning outcomes and goals may improve the desirability of the latter.
  • Students reported that faculty are banning or discouraging the use of laptops, tablets, and (especially) smartphones more often than in previous years. Some students reported using their devices (especially their smartphones) for nonclass activities, which might explain the instructor policies they are experiencing. However, they also reported using their devices for productive classroom activities (e.g., taking notes, researching additional sources of information, and instructor-directed activities).

++++++++++++++
more on ECAR studies in this IMS blog
https://blog.stcloudstate.edu/ims?s=ecar

media literacy part of digital citizenship

Making Media Literacy Central to Digital Citizenship

that kind of tech — expensive, bleeding-edge tools — makes headlines but doesn’t make it into many classrooms, especially the most needy ones. What does, however, is video.

68 percent of teachers are using video in their classrooms, and 74 percent of middle schoolers are watching videos for learning.

Video is a key aspect of our always-online attention economy that’s impacting votingbehavior, and fueling hate speech and trolling. Put simply: Video is a contested civic space.

We need to move from a conflation of digital citizenship with internet safety and protectionism to a view of digital citizenship that’s pro-active and prioritizes media literacy and savvy.

equip students with some essential questions they can use to unpack the intentions of anything they encounter. One way to facilitate this thinking is by using a tool like EdPuzzle

We need new ways of thinking that are web-specific. Mike Caulfield’s e-book is a great deep dive into this topic, but as an introduction to web literacy you might first dig into the notion of reading “around” as well as “down” media — that is, encouraging students to not just analyze the specific video or site they’re looking at but related content (e.g., where else an image appears using a reverse Google image search).

Active viewing — engaging more thoughtfully and deeply with what you watch — is a tried-and-true teaching strategy for making sure you don’t just watch media but retain information.

For this content, students shouldn’t just be working toward comprehension but critique; they need to not just understand what they watch, but also have something to say about it. One of my favorite techniques for facilitating this more dialogic and critical mode of video viewing is by using aclassroom backchannel, like TodaysMeet, during video viewings

only 3 percent of the time tweens and teens spend using social media is focused on creation

There are a ton of options out there for facilitating video creation and remix, but two of my favorites are MediaBreaker and Vidcode.

The Anti-Defamation League and Teaching Tolerance have lesson plans that connect to both past and present struggles, and one can also look to the co-created syllabi that have sprung up around Black Lives MatterCharlottesville, and beyond. Pair these resources with video creation tools,

+++++++++++++++++++
more on media literacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=media+literacy

more on digital citizenship in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+citizenship

VR and students with special needs

Bibliography on virtual reality and students with physical and cognitive disabilities

Jeffs, T. L. (2009). Virtual Reality and Special Needs. Themes In Science And Technology Education2(1-2), 253-268.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ1131319%26site%3dehost-live%26scope%3dsite

Lahav, O., Sharkey, P., & Merrick, J. (2014). Virtual and augmented reality environments for people with special needs. International Journal Of Child Health And Human Development7(4), 337-338.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2015-10704-001%26site%3dehost-live%26scope%3dsite

Cai, Y., Chiew, R., Nay, Z. T., Indhumathi, C., & Huang, L. (2017). Design and development of VR learning environments for children with ASD. Interactive Learning Environments25(8), 1098-1109. doi:10.1080/10494820.2017.1282877

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d125723945%26site%3dehost-live%26scope%3dsite

Passig, D. (2011). The Impact of Immersive Virtual Reality on Educators’ Awareness of the Cognitive Experiences of Pupils with Dyslexia. Teachers College Record113(1), 181-204.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ913420%26site%3dehost-live%26scope%3dsite

Ke, F., & Im, T. (2013). Virtual-Reality-Based Social Interaction Training for Children with High-Functioning Autism. Journal Of Educational Research106(6), 441-461. doi:10.1080/00220671.2013.832999

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d90465242%26site%3dehost-live%26scope%3dsite

Collins, J., Hoermann, S., & Regenbrecht, H. (2016). Comparing a finger dexterity assessment in virtual, video-mediated, and unmediated reality. International Journal Of Child Health And Human Development9(3), 333-341.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2016-53422-009%26site%3dehost-live%26scope%3dsite

Epure, P., Gheorghe, C., Nissen, T., Toader, L. O., Macovei, A. N., Nielsen, S. M., & … Brooks, E. P. (2016). Effect of the Oculus Rift head mounted display on postural stability. International Journal Of Child Health And Human Development9(3), 343-350.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2016-53422-010%26site%3dehost-live%26scope%3dsite

Sánchez, J., & Espinoza, M. (2016). Usability and redesign of a university entrance test based on audio for learners who are blind. International Journal Of Child Health And Human Development9(3), 379-387.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2016-53422-014%26site%3dehost-live%26scope%3dsite

Rizzo, A. A., Bowerly, T., Shahabi, C., Buckwalter, J. G., Klimchuk, D., & Mitura, R. (2004). Diagnosing Attention Disorders in a Virtual Classroom. Computer (00189162)37(6), 87-89.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d13425208%26site%3dehost-live%26scope%3dsite

Eden, S. (2008). The effect of 3D virtual reality on sequential time perception among deaf and hard-of-hearing children. European Journal Of Special Needs Education23(4), 349-363. doi:10.1080/08856250802387315

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d34716698%26site%3dehost-live%26scope%3dsite

Eden, S., & Bezer, M. (2011). Three-dimensions vs. two-dimensions intervention programs: the effect on the mediation level and behavioural aspects of children with intellectual disability. European Journal Of Special Needs Education26(3), 337-353. doi:10.1080/08856257.2011.593827

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d65025967%26site%3dehost-live%26scope%3dsite

Lorenzo, G., Lledó, A., Roig, R., Lorenzo, A., & Pomares, J. (2016). New Educational Challenges and Innovations: Students with Disability in Immersive Learning Environments. In Virtual Learning. InTech. https://doi.org/10.5772/65219

https://www.intechopen.com/books/virtual-learning/new-educational-challenges-and-innovations-students-with-disability-in-immersive-learning-environmen

+++++++++++++
more on virtual reality in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality

safe social media

Tips Toward a Safe and Positive Social Media Experience

By Stephen Spengler 06/01/17

https://thejournal.com/articles/2017/06/01/tips-toward-a-safe-and-positive-social-media-experience.aspx

Family Online Safety Institute recommends that parents engage in “7 Steps to Good Digital Parenting”

1. Talk with your children.

2. Educate yourself.

3. Use parental controls. Check the safety controls on all of the Android and Apple devices that your family uses. On the iPhone, you can tap SETTINGS > GENERAL> RESTRICTIONS and you can create a password that allows you enable/disable apps and phone functions. On Android devices, you can turn on Google Play Parental Controls by going into the Google Play Store settings

parental monitoring software such as NetNanny, PhoneSherriff, Norton Family Premier and Qustodio.

4. Friend and follow your children on social media. Whether it’s musical.ly, Instagram or Twitter, chances are that your children use some form of social media. If you have not already, then create an account and get on their friends list.

5. Explore, share and celebrate.

6. Be a good digital role model.

7. Set ground rules and apply sanctions. Just like chore charts or family job lists, consider using a family social media or internet safety contract. These contracts establish ground rules for when devices are to be used; what they should and should not be doing on them; and to establish sanctions based on breaches of the family contract. A simple internet search for “family internet contract” or “family technology contract” will produce a wealth of available ideas and resources to help you implement rules and sanctions revolving around your family’s technology use. A good example of a social media contract for children can be found at imom.com/printable/social-media-contract-for-kids/.

Managing Your Digital Footprint

Your digital footprint, according to dictionary.com, is “one’s unique set of digital activities, actions, and communications that leave a data trace on the internet or on a computer or other digital device and can identify the particular user or device.” Digital footprints can be either passive or active. The passive digital footprint is created without your consent and is driven by the sites and apps that you visit. The data from a passive digital footprint could reveal one’s internet history, IP address, location and is all stored in files on your device without you knowing it. An active digital footprint is more easily managed by the user. Data from an active digital footprint shows social media postings, information sharing, online purchases and activity usage.

  • Search for yourself online
  • Check privacy settings.
  • Use strong passwords
  • Update software.
  • Maintain your device.
  • Think before you post

Keep These Apps on Your Radar

  • Afterschool (minimum age 17) – The Afterschool App was rejected twice from the major app stores due to complaints from parents and educators. It is a well-known app that promotes cyberbullying, sexting, pornography and is filled with references to drugs and alcohol.
  • Blue Whale (minimum age 10) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. It is a suicide challenge app that attempts to prod children into killing themselves.
  • BurnBook (minimum age 18) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. It is a completely anonymous app for posting text, photos, and audio that promote rumors about other people. It is a notorious for cyberbullying
  • Calculator% (minimum age 4) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. This is one of hundreds of “secret” calculator apps. This app is designed to help students hide photos and videos that they do not want their parents to see. This app looks and functions like a calculator, but students enter a “.”, a 4-digit passcode, and then a “.” again.
  • KIK (minimum age 17) – This is a communications app that allows anyone to be contacted by anyone and it 100 percent bypasses the device’s contacts list.
  • Yik Yak (minimum age 18) – This app is a location-based (most commonly schools) bulletin board app. It works anonymously with anyone pretending to be anyone they want. Many schools across the country have encountered cyberbullying and cyberthreats originating from this app.
  • StreetChat (minimum age 14) – StreetChat is a photo-sharing board for middle school, high school and college-age students. Members do not need to be a student in the actual school and can impersonate students in schools across the country. It promotes cyberbullying through anonymous posts and private messaging.
  • ooVoo (minimum age 13) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. ooVoo is one of the largest video and messages app. Parents should be aware that ooVoo is used by predators to contact underage children. The app can allow users to video chat with up to twelve people at one time.
  • Wishbone (girls) & Slingshot (boys) (minimum age 13) – Both are comparison apps that allow users to create polls, including ones that are not appropriate for children. Many of the users create polls to shame and cyberbully other children, plus there are inappropriate apps and videos that users are forced to watch via the app’s advertising engine.

+++++++++++++++++++

Texas Teen May Be Victim in ‘Blue Whale Challenge’ That Encourages Suicide

Isaiah Gonzalez, 15, found hanging from his closet after an apparent suicide, as allegedly instructed by macabre online game

http://www.rollingstone.com/culture/news/texas-teen-latest-victim-in-challenge-that-promotes-suicide-w491939

Nationally, the Associated Press reports that educators, law enforcement officers and parents have raised concerns about the challenge, though these two back-to-back deaths mark the first allegations in the United States about deaths directly linked to the online game. Internationally, suicides in Russia, Brazil, and half a dozen other countries have already been linked to the challenge.

++++++++++++++++++++
more on social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education

cybersecurity and students

You’ve Been Hacked! Explaining Cybersecurity to Students in an Interconnected Era

By Jacob Batchelor 06/01/17

https://thejournal.com/articles/2017/06/01/youve-been-hacked-explaining-cybersecurity-to-students-in-an-interconnected-era.aspx

Here’s an easy way to explain IoT hacks to students:

  • A hacker accesses a device, like a webcam, through its internet connection. Devices with weak security or easy-to-guess passwords make easy targets.
  • The hacker can then infect the device with malware, a type of computer virus that takes control of a device.
  • The hacker now has a number of options. He or she can use the device to spy, infect other devices or attack a target like the servers (centralized computers that store network data) targeted in the October 2016 attack.
  • Research the manufacturer. Are they reputable? Have they previously been hacked? Big, established companies based in developed countries are usually the safest.
  • Read up on security features. Is the device password-protected? Can you set your own password? If so, make it a strong password that uses numbers, letters and symbols — avoid common words or phrases.
  • Regularly check for updates. Good companies will regularly update the software on their devices to protect against vulnerabilities.
  • Ask yourself — do you need it? Make sure internet-connectivity is something you really need on the device you’re using. In many cases, internet-connectivity is not necessary for the device to function properly.

a few tips that students can use to protect their privacy while using smartphones:

  • Research apps before signing up for them. Is it from a reputable developer? Has it had security issues in the past? Use the same approach as when researching IoT devices.
  • Look over the terms of service. What information does it require? Does it track or store your data? Can the developer sell your information? All of these questions are important to consider.
  • Be careful when linking apps to your social media accounts. Giving apps access to your social media accounts makes them vulnerable to hacking. Is there a good reason for the accounts to be linked? Can you sign up without linking to a social media account?
  • Use two-factor authentication. Two-factor authentication requires authorization beyond a password when using unrecognized devices such as entering a code sent to your cellphone. As apps allow, be sure to use two-factor authentication which will make it more difficult for hackers to access the information stored in your apps.

++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

social media in classroom

Social Media in the Classroom: Teaching the tools at your students’ fingertips today will prepare them for what’s to come in the future.

By

Visual Literacy. Using Instagram to select a single photo to capture an overall concept would transfer to so many subject areas.

People, in general, love Twitter, Facebook, Pinterest and other networks, because they want to share their pictures, videos and thoughts with the world; this sort of sharing makes people feel important. When kids feel important about what they share, they, in turn, believe that what they learn is important. This is truly what 21st-century learning is about.

+++++++++++
more on social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education

students technology employment

Technology Use Boosts Students’ Confidence in Their Job Prospects [#Infographic]

Graduating seniors believe the technology skills they’ve acquired in college will help them start their careers.

technology career transition

+++++++++++++++++++
more on employment and technology in this IMS blog
https://blog.stcloudstate.edu/ims?s=employment+technology

social media in your course

8 Things You Should Know before Using Social Media in Your Course

Jennifer Rafferty, Director, OLC Institute for Professional Development, 

https://onlinelearningconsortium.org/8-things-you-should-know-before-using-social-media-in-your-course

a variety of available platforms, and many creative ways that faculty are integrating social media into their teaching practice.

  • how the digital medium will foster engagement and enhance learning outcomes.
  • aware of the implications of having students post content on third-party services (those not provided or hosted by your institution).
  • Social media usage in the classroom intersects with both FERPA and Copyright Compliance, so keep this checklist handy as you develop your class activity.

Include details about the activity in your syllabus & course description.

Use contracts.
Link to institutional policies.
Use aliases for social media accounts.
Teach your students to use digital media responsibly.
Know where to provide assignment feedback.
Don’t use personal accounts for university business.
Understand the Terms of Service.

Sources

Classification of Social Media Platforms, DelValle Institute Knowledge Base, Office of Public Health Preparedness. Retrieved on March 24, 2017 from  https://delvalle.bphc.org/mod/wiki/view.php?pageid=65

Copyright Clearance Center, Inc. 2005. Using Digital Content. Retrieved on March 24, 2017 from http://www.copyright.com/Services/copyrightoncampus/basics/teach.html

Educause, Is Your Use of Social Media FERPA Compliant? Retrieved on March 24, 2017 from http://www.educause.edu/ero/article/your-use-social-media-ferpa-compliant

Kind, T., Genrich G. and Chretien, K.(2010)  Social Media Policies at US Medical Schools. Medical Education Online.  Retrieved on March 24, 2017 from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2941429/

Meyer, L., (2015). Six Alternative Social Media Tools for Teaching and Learning, Campus Technology. Retrieved on March 24, 2017 from https://campustechnology.com/Articles/2015/01/07/6-Alternative-Social-Media-Tools-for-Teaching-and-Learning.aspx?Page=4

Orlando, J., 2011. FERPA and Social Media, Faculty Focus. Retrieved on March 24, 2017 from http://www.facultyfocus.com/articles/teaching-with-technology-articles/ferpa-and-social-media/

+++++++++++++++++++++++++
more on social media for teaching practices in this IMS blog

https://blog.stcloudstate.edu/ims?s=social+media+teaching

teaching age social media

Teaching in the age of social media

Engaging with students – both inside and outside the classroom – who are continually linked in to social media and online devices presents a range of opportunities, challenges and pitfalls.

By DAVID SMITH | April 5, 2017
More and more of our public, private and professional lives are migrating online. There is little doubt that social media will infiltrate every aspect of our day-to-day existence. If used effectively, online tools are revolutionary for communicating and stimulating important conversations.

+++++++++++++++++++
more on use of technology in the classroom in this IMS blog
https://blog.stcloudstate.edu/ims/2017/04/03/use-of-laptops-in-the-classroom/
more on teaching with social media in this IMS blog
https://blog.stcloudstate.edu/ims?s=teach+social+media 

1 2 3 4 5 6 23