Social Networks and Students’ Ethical Behavior

Author(s):  
Lori N.K. Leonard ◽  
Tracy S. Manly

Social networking sites are prevalent among young adults. College students in particular are utilizing these sites to keep in contact with friends and to make new friends. However, with the positives of social networking, there are also negatives. Students can provide too much personal information online, engage in inappropriate conversations, scrutinize other students, ridicule peers, and so forth. Because of the impersonal environment that technology creates, an individual’s normal behavior can change which leads to a change in his/her basic ethical structure. The purpose of this chapter is to provide a discussion of the changing ethical structure of students, as well as an examination of the ways to teach ethics, given those changes. The chapter also includes a discussion of four classical ethical theories that should be considered when discussing or teaching social networking. Future research directions are also given.

Author(s):  
Michelle F. Wright

Children and adolescents grow up in a constantly connected digital world. They maintain active involvement in the digital world through the creation of blogs, communication via social networking sites, and watching videos. Despite the opportunities seeming almost limitless in a digitally connected world, there is a darker side to electronic technology usage. Cyberbullying is a darker side to children's and adolescents' immersion in a digital world. Incorporating research from around the world and across multiple disciplines, the aim of this chapter is to describe the nature, extent, causes, and consequences associated with children's and adolescents' cyberbullying involvement. The chapter concludes with solutions and recommendations in order to further cyberbullying intervention and prevention. Such an approach is important as cyberbullying is a phenomenon occurring throughout the world. Future research directions are also given, with the aim of furthering research on cyberbullying in an effort to improve the world's understanding of these behaviors.


Author(s):  
Vimitha R. Vidhya Lakshmi ◽  
Gireesh Kumar T.

Mobile Social Networks and its related applications have made a very great impact in the society. Many new technologies related to mobile social networking are booming rapidly now-a-days and yet to boom. One such upcoming technology is Opportunistic Mobile Social Networking. This technology allows mobile users to communicate and exchange data with each other without the use of Internet. This paper is about Opportunistic Mobile Social Networks, its architecture, issues and some future research directions. The architecture and issues of Opportunistic Mobile Social Networks are compared with that of traditional Mobile Social Networks. The main contribution of this paper is regarding privacy and security issues in Opportunistic Mobile Social Networks. Finally, some future research directions in Opportunistic Mobile Social Networks have been elaborated regarding the data's privacy and security.


Author(s):  
Rachelle DiGregorio ◽  
Harsha Gangadharbatla

Gamified self has many dimensions, one of which is self-tracking. It is an activity in which a person collects and reflects on their personal information over time. Digital tools such as pedometers, GPS-enabled mobile applications, and number-crunching websites increasingly facilitate this practice. The collection of personal information is now a commonplace activity as a result of connected devices and the Internet. Tracking is integrated into so many digital services and devices; it is more or less unavoidable. Self-tracking engages with new technology to put the power of self-improvement and self-knowledge into people's own hands by bringing game dynamics to non-game contexts. The purpose of this chapter's research is to move towards a better understanding of how self-tracking can (and will) grow in the consumer market. An online survey was conducted and results indicate that perceptions of ease of use and enjoyment of tracking tools are less influential to technology acceptance than perceptions of usefulness. Implications and future research directions are presented.


Author(s):  
Sylvaine Castellano ◽  
Insaf Khelladi

New opportunities and challenges are emerging thanks to the growing Internet importance and social media usage. Although practitioners have already recognized the strategic dimension of e-reputation and the power of social media, academic research is still in its infancy when it comes to e-reputation determinants in a social networks context. A study was conducted in the sports setting to explore the impact of social networks on the sportspeople's e-reputation. Whereas the study emphasized (1) the influence of social networks' perception on the sportspeople's e-reputation, and the neutral roles of (2) the motives for following sportspeople online, and (3) the negative content on the Internet, additional insights are formulated on maintaining, restoring and managing e-reputation on social networks. Finally, future research directions are suggested on the role of image to control e-reputation.


2016 ◽  
Vol 40 (2) ◽  
pp. 282-294 ◽  
Author(s):  
Ann E Williams ◽  
Melissa A. Woodacre

Purpose – The purpose of this paper is twofold: the first aim is theoretical – to review extant literature on academic social networks, while considering current limitations and potential avenues for future research; the second objective is practical – to introduce an illustrative comparison guide that researchers can use to identify and distinguish between the functionalities of popular academic social networking sites (ASNSs), including Academia.edu, Mendeley.com, ResearchGate.net, Zotero.org, and Google Scholar. Design/methodology/approach – The review of research is descriptive and conceptual. Findings – The overarching outcomes of the review suggest that research on academic social networks falls into two primary arenas – promises (i.e. potential benefits to the academic community) and perils (i.e. reservations expressed by scholars). The authors recommend that a greater focus on the unique characteristics and utilities of specific sites and a more robust understanding of scholars’ use preferences and practices is warranted in future and ongoing research. Originality/value – This is the first review of ASNSs to provide comparative descriptions for scholars to utilize when making decisions about adoption, use, and research.


Author(s):  
Vladlena Benson

As the social technology matured in recent years, so did the threat landscape of the online medium. Fears about breaches of privacy and personal information security seem to dominate the list of concerns of social media users described in literature. Popular press continually reports cases of inadvertent and malicious information disclosure and breaches, cyberbullying, and stalking. Yet, social networking sites proliferated into all areas of human activity. The factor causing this phenomenon lies in the trusted nature of networks and the sense of trustworthiness of this easy-to-use technology. The formation of trust into social technology has attracted much attention, and this chapter offers an overview of the trust predictors in social settings. It continues with a retrospective into the threat landscape and the use of personalisation by social networking services to counter some of these threats. Further research directions are discussed.


Author(s):  
Ioannis Giannoulakis ◽  
Emmanouil Kafetzakis ◽  
Anastasios Kourtis

This chapter provides an account of the most significant areas of scenarios and applications relevant to Device-To-Device (D2D) communications. At first, a state of the art review is provided, with focus on the special technological challenges. In addition, integration initiatives with modern cellular technologies and standards are given. Important architecture concepts like e.g., resource management and mobility issues have been highlighted, in order to present the main areas of impact of D2D communications. Since D2D communications capitalise on the contemporary networking paradigm of cooperative communications novel methods for overcoming several limitations have been discussed and emerging paradigms such as proximity and location-based services, coupled with social networking and commercial services have been considered. Finally, possible future research directions relevant to D2D networking are discussed.


Author(s):  
Alexa Delbosc ◽  
Graham Currie

Young adults are becoming less dependent on the car for travel. Increased use of information and communication technology (ICT) has been linked to this trend; this link suggests that ICT enables connection without wheels and thus less travel. This study tested that theory through a survey of young adults in Melbourne, Victoria, Australia. Two competing hypotheses were tested: (a) increased contact through ICT replaces–reduces in-person travel and (b) increased contact through ICT complements–increases in-person travel. The survey found that contact with friends was a high priority for young adults: 81% contacted friends daily through social media, 74% by phone, and 39% in person. A multinomial logistic regression tested associations between frequent in-person contact and several variables. Daily social media and telephone contact with friends was strongly associated with more frequent in-person contact. Daily social media use made someone 6.7 times more likely to have seen friends daily, while daily phone contact made someone 9.9 times more likely to have seen friends daily. The findings supported the complement–increase hypothesis (i.e., ICT use complements in-person contact rather than replaces it). Results are discussed and future research directions proposed.


Sign in / Sign up

Export Citation Format

Share Document