Lis580 seminargroup3


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Multiple functions produce multiple, often competing, demands on the chart.
  • UMLS is the major developmental tool for medical vocabulary
  • Lis580 seminargroup3

    1. 1. Youth, Social Networking, and Intellectual Freedom Presented by Amanda Gallineau, Meghan Marong, and Patricia Powers LIS 580 Intellectual Freedom University at Buffalo November 2, 2010
    2. 2. What is social networking? <ul><li>Connecting </li></ul><ul><li>Mutual bonds </li></ul><ul><li>Communication </li></ul><ul><li>Sharing </li></ul>
    3. 3. Popular social networking sites <ul><li>Facebook </li></ul><ul><li>MySpace </li></ul><ul><li>Twitter </li></ul><ul><li>Blogger </li></ul><ul><li>Delicious </li></ul><ul><li>Flickr </li></ul>
    4. 4. The purpose of social networking sites <ul><li>Finding long lost schoolmates </li></ul><ul><li>Connecting family members </li></ul><ul><li>Long distance communication </li></ul><ul><li>Escape from reality </li></ul><ul><li>Community environment </li></ul><ul><li>Business marketing tool </li></ul>
    5. 5. Questions concerning social networking <ul><li>What criteria defines a “friend” on a social network? </li></ul><ul><li>What does it means to out in “public” on the Net? </li></ul><ul><li>What personal items should be exposed? (i.e. videos, pictures, status, etc.) </li></ul><ul><li>How safe are you on a social networking site? </li></ul><ul><li>Are social network users taken for granted? </li></ul><ul><li>Are social network sites doing enough to control access to the privacy of users’ information? </li></ul>
    6. 6. Intellectual freedom factors of social networking <ul><li>Potential employers’ access to personal profiles on social networking sites – affects one’s career future </li></ul><ul><li>Public access to immediate family information </li></ul><ul><li>Open window into one’s personal beliefs </li></ul><ul><li>DOPA: Deleting Online Predators Act </li></ul><ul><li>Political perceptions: Concept of social networking as defined by liberals or conservatives </li></ul>
    7. 7. Technological and Legal Challenges of Social Networking for Libraries
    8. 8. Deleting Online Predators Acts (DOPA) <ul><li>DOPA was a legislative bill that was brought before the U.S. House of Representatives in 2006. </li></ul><ul><li>If passed, the bill would require every school and library that receives E-rate funding to protect minors from sexual predators. </li></ul><ul><li>The E-rate funding would go towards filtering and blocking social networking sites. </li></ul><ul><li>DOPA was passed from the House to the Senate, and was never voted on. </li></ul>
    9. 9. ALA vs. DOPA <ul><li>The American Library Association asked its members to vote against the Deleting Online Predators Act. </li></ul><ul><li>Former ALA President Michael Gorman said: </li></ul><ul><ul><li>“ We know that the best way to protect children is to teach them to guard their privacy and make wise choices. To this end, libraries across the country offer instruction on safe Internet use.” </li></ul></ul>
    10. 10. Roles of librarians in social networking <ul><li>Our role is not to censor or filter, but to educate. </li></ul><ul><ul><li>We cannot change the safety of social networking, but we can help parents and individuals to protect themselves. </li></ul></ul><ul><ul><li>We can be active in learning the risks of social networking and share the information with our users. </li></ul></ul>
    11. 11. What can we provide for our users? <ul><li>Inform users on the dangers of social networking: </li></ul><ul><ul><li>Pamphlets </li></ul></ul><ul><ul><li>List of valid online resources for parents and kids </li></ul></ul><ul><ul><li>Free online social network safety classes </li></ul></ul><ul><ul><li>Classes available to public in library </li></ul></ul><ul><ul><ul><li>Mandatory class before users access the internet? </li></ul></ul></ul>
    12. 12. Resources <ul><li>Online: </li></ul><ul><ul><li>ikeepsafe Internet Safety Coalition </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><ul><li>Federal Trade Commission: Facts for Consumers </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><ul><li>Social Networking Safety - Microsoft Protect </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul>
    13. 13. Social networking safety questions <ul><li>Think about what information you are sharing </li></ul><ul><ul><li>Full name? Address? Phone number? Email? </li></ul></ul><ul><li>What are your privacy settings? </li></ul><ul><ul><li>Who is able to view your page? </li></ul></ul><ul><ul><ul><li>Friends </li></ul></ul></ul><ul><ul><ul><li>Friends of friends </li></ul></ul></ul><ul><ul><ul><li>Anyone? </li></ul></ul></ul><ul><li>Who is looking at your page? </li></ul><ul><ul><li>Is your page being looked at people other than friends? </li></ul></ul><ul><ul><ul><li>Parents </li></ul></ul></ul><ul><ul><ul><li>Employers </li></ul></ul></ul><ul><ul><ul><li>Students </li></ul></ul></ul>
    14. 14. Social networking safety questions (continued) <ul><li>Do you have pictures of yourself posted? </li></ul><ul><ul><li>Again, who is looking at the pictures? </li></ul></ul><ul><li>Does your status tell too much? </li></ul><ul><ul><li>Are you broadcasting information that reveals too much? </li></ul></ul><ul><ul><ul><li>Away on vacation </li></ul></ul></ul><ul><ul><ul><li>Where you are going to be </li></ul></ul></ul><ul><ul><ul><li>Home alone </li></ul></ul></ul><ul><ul><ul><li>“ Vulnerable situations” </li></ul></ul></ul>
    15. 15. Social networking safety questions (continued) <ul><li>Who are you “friends” with? </li></ul><ul><ul><li>Are you really friends with your “friends”? </li></ul></ul><ul><ul><li>Do you talk (face-to-face) with the people you are friends with on social networking? </li></ul></ul><ul><li>Stranger Danger </li></ul><ul><ul><li>Be careful chatting online with strangers. </li></ul></ul><ul><ul><li>Do not give out information to people you do not know. </li></ul></ul><ul><ul><li>Do not trust meeting online strangers in person. </li></ul></ul>
    16. 16. Social networking in libraries <ul><li>Is there any room for social networking in public or school libraries? </li></ul><ul><ul><li>MySpace or Facebook accounts to keep students/users informed </li></ul></ul><ul><ul><li>Librarian blog </li></ul></ul><ul><ul><ul><li>New materials in library </li></ul></ul></ul><ul><ul><ul><li>Book lists/book talks </li></ul></ul></ul>
    17. 17. Issues Concerning Youth, Social Networking, and Intellectual Freedom
    18. 18. Issue #1 <ul><li>Social networks are often described as “objectionable” and “age inappropriate” in terms of young people. </li></ul><ul><ul><li>Your role as an intellectual freedom advocate: Help all patrons distinguish between hype and concern about social technologies. Rather than labeling a technology as inappropriate, help people to make informed decisions about them. </li></ul></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul>
    19. 19. Issue #2 <ul><li>While school and public libraries must adhere to laws such as CIPA, COPPA, and DOPA, these laws tend to restrict access based on technology rather than content. </li></ul><ul><ul><li>Your role as an intellectual freedom advocate: Comply with the laws, but review your institution’s use policies and filtering software to examine how to best use social networks to educate instead of simply limiting access. </li></ul></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul>
    20. 20. Issue #3 <ul><li>When young people participate in online communities, they may come into contact with strangers who have malicious intent. </li></ul><ul><ul><li>Your role as an intellectual freedom advocate: Instruct young people about how to balance the desire for interaction with the importance of personal safety. Help students makes distinction between information they might post on private and public sites. </li></ul></ul>
    21. 21. Issue #4 <ul><li>Limitations on Web access for young people may decrease the chance of contact with dangerous people, but it also denies students the opportunity to publish intellectual work for a wider audience. </li></ul><ul><ul><li>Your role as an intellectual freedom advocate: Build your students’ social technology skills through experiences with open and closed social systems. </li></ul></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul>
    22. 22. Issue #5 <ul><li>Information professionals who serve young people should update their collection, selection, and reconsideration policies to reflect emerging technologies such as social networks. </li></ul><ul><ul><li>Your role as an intellectual freedom advocate: Ensure that your library policies are current and reflect the unique attributes of social networking. </li></ul></ul><ul><ul><li> </li></ul></ul>
    23. 23. Conclusions <ul><li>The best practice for addressing harassment and bullying of young people is not to further restrict their intellectual freedom by applying filters to technology, but rather to advise them on how to be mindful of the consequences of statements and behaviors online. </li></ul><ul><li>When awareness of cyber-bullying and online predators is recognized by young people, their curiosity will be a first step to prevention. </li></ul>
    24. 24. References American Library Association, (2006). ALA Podcast Script: Online Social Networks. Retrieved October 17, 2010, from American Library Association Web site: Barnes, S.B. (2006). A Privacy Paradox: Social Networking in the United States. Retrieved from fm/article/viewArticle/1394/1312%23note4   Hamilton, S. (2003). Freedom of access to information and freedom of expression: the Internet as a tool for global social inclusion. Library Management , 24(8/9), 407-416. Retrieved October 17, 2010 from Emerald Gate Database. Hinduja, S., Patchin, J.W. (2010). Changes in adolescent online social networking behaviors from 2006 to 2009 Computers in Human Behavior. Retrieved from Google Scholar.  
    25. 25. References   Lamb, A. (2007). Intellectual freedom for youth: social technology and social networks. Knowledge Quest, 36 (2), 38-45. Mezrich, Ben. (2009). Friends and foes: The Accidental Billionaires: The Founding of Facebook: A Tale of Sex, Money, Genius and Betrayal. The Economist, Retrieved November 1, 2010 from, . Mitchell, K.J., Finkelhor, D., Jones, L.M., Wolak, J. (2010). Use of Social Networking Sites in Online Sex Crimes Against Minors: An Examination of National Incidence and Means of Utilization. Journal of Adolescent Health, 47, 183-190.   Pempek, Tiffany. (2009). College students' social networking experiences on Facebook. Journal of Applied Developmental Psychology , 30, 227-238. Retrieved October 17, 2010 from, doi:10.1016/j.appdev.2008.12.010.
    26. 26. References Smith, William P, Deborah L. Kidder. (2009). You’ve been tagged! (Then again, maybe not): Employers and Facebook . Business Horizons, 53, 491-499. Retrieved October 17, 2010 from Science Direct Database. Snow, G.M. (2010). Online Privacy, Social Networking and Crime Victimization. Testimony before the FDCH Congressional. Retrieved from MasterFILE Premier.   Young Adult Library Services Association (2006). DOPA Information Packet: A Resource for Librarians and Library Workers. Retrieved from /ala/mgrps/divs/yalsa/profdev/DOPAInfoPacket.pdf