But Do They Want Us in “Their” World?

2012 ◽  
pp. 1353-1369
Author(s):  
Tim Brown ◽  
Amanda Groff

The growth of social media and mobile communication provides educators with an opportunity to transmit course-related information to students in new ways. But are students willing to accept course information through those channels, typically seen as “fun” and “social?” The study in this chapter examines the reasons that students use different types of personal media and how appropriate certain types of communication channels are for academic information. Results show that students prefer to get their academic information through “official” channels, such as email and course management systems. However, they are willing to accept certain types of information through social channels (mobile devices, social networking), as long as they do not have to share personal information.

Author(s):  
Tim Brown ◽  
Amanda Groff

The growth of social media and mobile communication provides educators with an opportunity to transmit course-related information to students in new ways. But are students willing to accept course information through those channels, typically seen as “fun” and “social?” The study in this chapter examines the reasons that students use different types of personal media and how appropriate certain types of communication channels are for academic information. Results show that students prefer to get their academic information through “official” channels, such as email and course management systems. However, they are willing to accept certain types of information through social channels (mobile devices, social networking), as long as they do not have to share personal information.


2019 ◽  
pp. 75-88
Author(s):  
Yutao Han ◽  
◽  
◽  
◽  
Ibrahim M. EL-Hasnony ◽  
...  

The advancements of information technologies and wireless networks have created open online communication channels. Inappropriately, trolls have abused the technologies to impose cyberattacks and threats. Automated cybersecurity solutions are essential to avoid the threats and security issues in social media. This paper presents an efficient dragonfly algorithm (DFA) with gated recurrent unit (GRU) for cybersecurity in social networking. The proposed DFA-GRU model aims to determine the social networking data into neural statements or insult (cyberbullying) statements. Besides, the DFA-GRU model primarily undergoes preprocessing to get rid of unwanted data and TF-IDF vectorizer is used. In addition, the GRU model is employed for the classification process in which the hyperparameters are optimally adjusted by the use of DFA, and thereby the overall classification results get improved. The performance validation of the DFA-GRU model is carried out using benchmark dataset and the results are examined under varying aspects. The experimental outcome highlighted the enhanced performance of the DFA-GRU model interms of distinct measures.


Author(s):  
Richard E Ferdig ◽  
Kara Dawson ◽  
Erik W Black ◽  
Nicole M. Paradise Black ◽  
Lindsay A. Thompson

This study sought to determine if and how 501 medical students and 312 residents are using Facebook at a large university in the Southeastern United States. Results reveal that medical students and residents are using Facebook and about two-thirds of users maintain public profiles. While there is variation in the types of information provide within profiles, many medical students seem unaware of or unconcerned with the possible ramifications of sharing personal information in publicly-available online profiles even though such information could impact their professional lives. Thus, this study provides data based evidence that online tools such as social networking sites should become a part of the dialogue related to preparing future physicians to meet the Accreditation Council on Graduate Medical Education (ACGE) professionalism competency.


First Monday ◽  
2011 ◽  
Author(s):  
Chris Fullwood ◽  
Mike Thelwall ◽  
Sam O'Neill

With the increasing popularity of social networking sites, it has become relatively common for Internet users to develop an online presence via a personal profile page. Moreover, some chat rooms allow members to develop profile pages too. As a potential first point of contact, effective profile construction may play a pivotal role in the management of first impressions. Identity construction in profiles seems to be particularly important for chat room users, because they are often likely to interact with strangers. Since chat rooms can be used for anti-social purposes, the type and extent of the information posted in chat room profiles seems likely to be different from that in online profiles for social networking sites, which may be more closely tied to offline identities. This investigation of information in 324 profiles from two Lycos chat rooms for adults found that most users include a picture of themselves on their profile, hence apparently tying themselves to their offline identity. Nevertheless, the majority remain anonymous, probably many more than for social networking sites and blog authors. There are sex differences in the types of information posted on chat room profiles, with women tending to include more personal information. Furthermore, older users are more likely to post information about relationship status and location than younger users. These sex and age differences in profile content may be a consequence of the different motivations for using the service as well as disparities in self-disclosure norms.


2017 ◽  
Vol 118 (7/8) ◽  
pp. 372-384
Author(s):  
Sarah McNicol ◽  
Karine Aillerie

Purpose This paper aims to report the findings from a survey of secondary school students in Chile by exploring their use of social networking services for information-seeking purposes. Design/methodology/approach An online survey was distributed via Chile’s Ministry of Education and 12,354 responses were received. Findings The results indicate that young people in Chile extensively use SNSs, but there are differences in the ways in which they use these services, specifically for information purposes. When considering school-related activities, there are differences in the use of SNSs by students in different types of schools. Those in academic-focussed institutions are more likely to use SNSs for school-related information purposes and are more likely to publish most types of information on SNSs than their counterparts in vocational schools. Research limitations/implications The sample was self-selecting and excluded students without online access to the survey. Practical implications The findings indicate more needs to be done in schools serving lower socio-economic communities to support students’ use of SNSs for information-seeking, especially for academic purposes. Social implications The findings suggest that school-associated social capital may have a role in shaping students’ use of SNSs for information and learning purposes and, potentially, in exacerbating digital inequalities. Originality/value The focus on the use of social media specifically for information-seeking distinguishes this research. The findings challenge possible assumptions about the links between social media use and social class and suggest that differences may be exacerbated by school practices.


2021 ◽  
Author(s):  
Anatoliy Gruzd ◽  
Jenna Jacobson ◽  
Elizabeth Dubois

The paper examines attitudes towards employers using social media to screen job applicants. In an online survey of 454 participants, we compare the comfort level with this practice in relation to different types of information that can be gathered from publicly accessible social media. The results revealed a nuanced nature of people’s information privacy expectations in the context of hiring practices. People’s perceptions of employers using social media to screen job applicants depends on (1) whether or not they are currently seeking employment (or plan to), (2) the type of information that is being accessed by a prospective employer (if there are on the job market), and (3) their cultural background, but not gender. The findings emphasize the need for employers and recruiters who are relying on social media to screen job applicants to be aware of the types of information that may be perceived to be more sensitive by applicants, such as social network-related information. Keywords : social media, information privacy, job screening, hiring practices


2021 ◽  
Author(s):  
Anatoliy Gruzd ◽  
Jenna Jacobson ◽  
Elizabeth Dubois

The paper examines attitudes towards employers using social media to screen job applicants. In an online survey of 454 participants, we compare the comfort level with this practice in relation to different types of information that can be gathered from publicly accessible social media. The results revealed a nuanced nature of people’s information privacy expectations in the context of hiring practices. People’s perceptions of employers using social media to screen job applicants depends on (1) whether or not they are currently seeking employment (or plan to), (2) the type of information that is being accessed by a prospective employer (if there are on the job market), and (3) their cultural background, but not gender. The findings emphasize the need for employers and recruiters who are relying on social media to screen job applicants to be aware of the types of information that may be perceived to be more sensitive by applicants, such as social network-related information. Keywords : social media, information privacy, job screening, hiring practices


Author(s):  
Vladlena Benson

As the social technology matured in recent years, so did the threat landscape of the online medium. Fears about breaches of privacy and personal information security seem to dominate the list of concerns of social media users described in literature. Popular press continually reports cases of inadvertent and malicious information disclosure and breaches, cyberbullying, and stalking. Yet, social networking sites proliferated into all areas of human activity. The factor causing this phenomenon lies in the trusted nature of networks and the sense of trustworthiness of this easy-to-use technology. The formation of trust into social technology has attracted much attention, and this chapter offers an overview of the trust predictors in social settings. It continues with a retrospective into the threat landscape and the use of personalisation by social networking services to counter some of these threats. Further research directions are discussed.


2021 ◽  
Vol 2021 (1) ◽  
pp. 80-93
Author(s):  
Fredricke Bryan Okello

The objective of this research study was to establish the effect of modern communication channels on taxpayer service experience in Kenya. This was answered using three research questions which revolved around social media, mobile communication and web portals and how each affected taxpayer service experience. The targeted population for the survey were all taxpayers in the Nairobi region who were registered as taxpayers in the iTax system and who form part of the country’s tax base. This comprised the total population for this study. To arrive at the sample for the survey, stratified random sampling was employed. The probit regression results from the analysis of the survey data show that the factors that significantly influence taxpayer service experience in Kenya are the individual’s age, gender, level of education, use of social media, mobile communication and web portals.


First Monday ◽  
2015 ◽  
Author(s):  
Angela M. Cirucci

Social networking sites allow people to create, broadcast, and interpret the self in new and evolving ways. While early online social media studies praised the Internet for providing an anonymous space in which to experiment with identity, more recent research suggests that social networking sites have become not anonymous, as they compel users to perform identity in new ways. Through a novel application of affordance theory, this paper argues that instead of attempting to apply outdated definitions of privacy to social networking spaces, we should instead be discussing our right to anonymity. I argue that privacy is immaterial due to the fact that from the moment we log in and interact with a social media interface, we have shared some type of personal information with someone. Anonymity, on the other hand, is defined as the unlinkability of our many identifications. Thus, instead of attempting to define ideas such as “personal” and “private,” we should instead fight for the separation of selves, both at the social and institutional level.


Sign in / Sign up

Export Citation Format

Share Document