Reflection 1.2 Instructions
When you entered this course, you may have had some prior concepts regarding the professional constraints faced by BC educators using technologies such as social media. How has the course content (material I post in the module), the readings and resources provided extended, challenged, or deepened your initial understanding? (Cite references as appropriate.) How do you see any of this content applying to you or your colleagues?
Reflection 1.2
September 7, 2013
Jane Jacek
Coming in to this course I understood that my interactions on social media both my personal sites and professional ones could at any time be viewed by others. Although Facebook is password protected the world is smaller than we think, and depending on what privacy settings others have or do not have set I can access all their personal information, posts and photos which means they may be able to access mine. This awareness has guided me to think professionally when using my Facebook account which I created to stay in touch with family and friends. I pay close attention to the photos I post and others post of me, how I respond to peoples’ posts and am selective about which comments or photos I say I “like”.
I created my accounts on Twitter, Pintrest and Google+ specifically for my graduate course so from the very beginning I had set out for myself guidelines for their use. Access to these accounts is different in that for the former two what I post can be seen by all as they are not password protected. As for Google+ my setting choice or that of my instructor decides whether it is or is not made public. Further in relation to Twitter thanks to Hengstler (2011) I am now aware that if I choose to delete a comment in Twitter the deletion would remove it from future viewers seeing it on my site but it would not affect the duplicates of that message that went to my many followers.
In relation to password protection, Hengstler (2012) updated in 2013, shared from Tappero (2013) that in April 2012, Maryland became the first US state to prohibit employers from requiring employees and job applicants to provide their social media passwords. Thankfully in Canada Hengstler (2012) noted that according to L. Stam (2012), the practice of requesting social media passwords of employees is “technically not illegal, (but it) is generally discouraged”.
Employers not only have a right to have access to our social media accounts but, shared by Hengstler (2012) from Stam (2012), in Canada it is lawful for an employer to discipline or dismiss an employee for their social media activity if there is a ‘nexus, in the workplace such as the excessive personal use during work hours. I was made aware of this in my role as a teacher, it was pointed out to me by a colleague and confirmed by our IT specialist that all school employees’ presence/activity on a work computer can and is being followed. Being an online teacher I have learned to make sure if I need to access social media for personal use that I do it on my lunch time or when my work day has ended.
The key here is that any activity on the web leaves a digital footprint whether it is passive, active or second-hand (Hengstler, 2012). A passive digital footprint as described by Madden, Fox, Smith, & Vitak (2007) and shared by Hengstler (2012) is the digital information collected about you. The key here, I feel, is that you are not consciously aware of the collection as it happens. Hengstler (2012) states that active digital footprints consist of digital information you knowingly and voluntarily share or contribute and second-hand digital footprints are made-up of information others publish about you in various digital environments-with or without your consent.
These footprints start from the time one first goes on a computer. Hengstler (2012) shared research from L. Indvik (2012) that showed digital presences are being seen for children as young as 2 years old. Hengstler (2012) then went on to say that the implications of this is not clear as no significant research as yet been done, but we need to start thinking about it.
I strongly agree with this statement by Hengstler (2012)
This doesn’t mean we need to fear participation in digital contexts like social media, but
it does mean that as individuals-and especially as professional or employees who place
value on our reputations and our continued/potential employment-we must be aware of
our digital footprint and vigilantly protect it. (p2)
We must as professionals be “Eagles”, watch closely and pay close attention to our digital presence/footprints. We cannot be “Ostriches” who pay no heed to what is shared, when it is shared or where it is shared. And it is our job as educators, and for some of us as parents, to teach the value and importance of being “Eagles”. (Wording Eagles and Ostriches from Hengstler, 2011)
References:
Hengstler, J. (2011). "Managing digital footprints: Ostriches v. eagles".(2011). In S.
Hirtz & K. Kelly (Eds.), Education for a Digital World 2.0 (2nd ed.) (Vol. 1,
Part One: Emerging technologies and practices). Open School/Crown
Publications: Queen's Printer for British Columbia, Canada.
Hengstler, J. (April 2012). "Digital professionalism and digital footprints". Document
prepared for training session with Vancouver Island University's
Administrative Assistants, April 2012.
Social Media Digital Footprints 2013_v3.pdf
When you entered this course, you may have had some prior concepts regarding the professional constraints faced by BC educators using technologies such as social media. How has the course content (material I post in the module), the readings and resources provided extended, challenged, or deepened your initial understanding? (Cite references as appropriate.) How do you see any of this content applying to you or your colleagues?
Reflection 1.2
September 7, 2013
Jane Jacek
Coming in to this course I understood that my interactions on social media both my personal sites and professional ones could at any time be viewed by others. Although Facebook is password protected the world is smaller than we think, and depending on what privacy settings others have or do not have set I can access all their personal information, posts and photos which means they may be able to access mine. This awareness has guided me to think professionally when using my Facebook account which I created to stay in touch with family and friends. I pay close attention to the photos I post and others post of me, how I respond to peoples’ posts and am selective about which comments or photos I say I “like”.
I created my accounts on Twitter, Pintrest and Google+ specifically for my graduate course so from the very beginning I had set out for myself guidelines for their use. Access to these accounts is different in that for the former two what I post can be seen by all as they are not password protected. As for Google+ my setting choice or that of my instructor decides whether it is or is not made public. Further in relation to Twitter thanks to Hengstler (2011) I am now aware that if I choose to delete a comment in Twitter the deletion would remove it from future viewers seeing it on my site but it would not affect the duplicates of that message that went to my many followers.
In relation to password protection, Hengstler (2012) updated in 2013, shared from Tappero (2013) that in April 2012, Maryland became the first US state to prohibit employers from requiring employees and job applicants to provide their social media passwords. Thankfully in Canada Hengstler (2012) noted that according to L. Stam (2012), the practice of requesting social media passwords of employees is “technically not illegal, (but it) is generally discouraged”.
Employers not only have a right to have access to our social media accounts but, shared by Hengstler (2012) from Stam (2012), in Canada it is lawful for an employer to discipline or dismiss an employee for their social media activity if there is a ‘nexus, in the workplace such as the excessive personal use during work hours. I was made aware of this in my role as a teacher, it was pointed out to me by a colleague and confirmed by our IT specialist that all school employees’ presence/activity on a work computer can and is being followed. Being an online teacher I have learned to make sure if I need to access social media for personal use that I do it on my lunch time or when my work day has ended.
The key here is that any activity on the web leaves a digital footprint whether it is passive, active or second-hand (Hengstler, 2012). A passive digital footprint as described by Madden, Fox, Smith, & Vitak (2007) and shared by Hengstler (2012) is the digital information collected about you. The key here, I feel, is that you are not consciously aware of the collection as it happens. Hengstler (2012) states that active digital footprints consist of digital information you knowingly and voluntarily share or contribute and second-hand digital footprints are made-up of information others publish about you in various digital environments-with or without your consent.
These footprints start from the time one first goes on a computer. Hengstler (2012) shared research from L. Indvik (2012) that showed digital presences are being seen for children as young as 2 years old. Hengstler (2012) then went on to say that the implications of this is not clear as no significant research as yet been done, but we need to start thinking about it.
I strongly agree with this statement by Hengstler (2012)
This doesn’t mean we need to fear participation in digital contexts like social media, but
it does mean that as individuals-and especially as professional or employees who place
value on our reputations and our continued/potential employment-we must be aware of
our digital footprint and vigilantly protect it. (p2)
We must as professionals be “Eagles”, watch closely and pay close attention to our digital presence/footprints. We cannot be “Ostriches” who pay no heed to what is shared, when it is shared or where it is shared. And it is our job as educators, and for some of us as parents, to teach the value and importance of being “Eagles”. (Wording Eagles and Ostriches from Hengstler, 2011)
References:
Hengstler, J. (2011). "Managing digital footprints: Ostriches v. eagles".(2011). In S.
Hirtz & K. Kelly (Eds.), Education for a Digital World 2.0 (2nd ed.) (Vol. 1,
Part One: Emerging technologies and practices). Open School/Crown
Publications: Queen's Printer for British Columbia, Canada.
Hengstler, J. (April 2012). "Digital professionalism and digital footprints". Document
prepared for training session with Vancouver Island University's
Administrative Assistants, April 2012.
Social Media Digital Footprints 2013_v3.pdf