O R I G I N A L P A P E R
‘‘It just crept in’’: The Digital Age and Implications for Social
Work Practice
Faye Mishna • Marion Bogo • Jennifer Root •
Jami-Leigh Sawyer • Mona Khoury-Kassabri
Published online: 11 February 2012
� Springer Science+Business Media, LLC 2012
Abstract Today’s generation of youth and adults relies
on communication technologies for entertainment, infor-
mation, and social connections and more and more, for
personal help and advice. With cyber technology having
permeated the ways in which individuals seek support for a
wide range of issues, the purpose of this paper is to report
on a study that examined practitioners’ experiences and
views of whether and how online communication has
entered their face-to-face practice and of the implication
for the therapeutic work. Using qualitative methodology,
15 social work practitioners participated in focus groups
and interviews exploring their perspectives about the
impact of cyber technology on their traditional face-to-face
social work practice. The prevailing finding was that cyber
communication has dramatically changed the nature of
professional relationships. This key finding was supported
by four major inter-related themes arising from the data:
(1) client driven practice; (2) Pandora’s box; (3) ethical
grey zone; and (4) permeable boundaries. Implications for
practice are provided.
Keywords Cyber technology in therapy � Cyber
communication in traditional social work � Cyber
technology and ethics � Online technology and social work
practice
Introduction
Long before the rise of the Internet generation, Marshall
McLuhan (1964) asserted, ‘‘the medium is the message.’’
This prophetic and timeless statement is particularly rele-
vant in today’s society, in which online technology shapes
how individuals communicate. Communication technology
is growing exponentially with each successive generation
as a central fixture within our society and has radically
changed individuals’ social interactions, learning strate-
gies, and choice of entertainment. In response to this dra-
matic growth of electronic communication and information
sharing, practitioners have offered treatment through com-
munication technology since the 1990s (Huang and Alessi
1996; Murphy and Mitchell 1998; Smith and Reynolds
2002) and, more than ever, offer interventions online.
Several benefits have been identified including greater
flexibility and accessibility (Chester and Glass 2006;
Glasgeen and Campbell 2009).
Today’s generation of both youth and adults relies on
communication technologies for entertainment, informa-
tion, and social connections and more and more, for per-
sonal help and advice. Indeed, cyber technology has
permeated the ways through which individuals seek sup-
port for a wide range of issues. The purpose of this paper is
to report on a study that examined practitioners’ experi-
ences and views of whether and how online communica-
tion has .
An Empirical Study on Online Social Networks Sites Usage Online Dating Sites...Jessica Henderson
This study examines online social network and dating site usage among university students in Malaysia. It finds that Facebook is the most popular social network, used mainly for communication. Only 12% of students reported using online dating sites, seeking long-term relationships for females and casual relationships for males. The study provides insight into students' attitudes and experiences with online socializing and dating.
Usage of YouTube Content among Chennai Urban Women.pdfPugalendhiR
Abstract: The majority of YouTube users are college students, therefore it's critical to understand their usage patterns,
goals, and any potential psychological and behavioural effects. In order to determine the current trends in YouTube usage
among female undergraduate students in Chennai City, this study will examine the devices used, memberships subscribed
to, purposes used, and identity formation time spent networking, negative impacts experienced, and educational usage.
Data from a survey were analysed with SPSS-Statistic 19.0 software, and the findings were compared to the examined
literature. According to the survey, students' YouTube networking habits will eventually win out over parents' and
teachers' attitudes, and although while cell phones are currently prohibited in many college buildings, they will
undoubtedly be utilised in classrooms in the near future. The discoveries provide the current study in this area more depth.
This study examines how Facebook users manage their privacy and personal information disclosure based on Communication Privacy Management theory. A survey and content analysis were conducted to understand the relationship between perceptions of Facebook privacy and efforts to stay updated on privacy settings. The introduction provides background on social networking sites and how they have changed communication. Hypotheses are presented that Facebook users who use the site daily will be more concerned about privacy and more likely to hide or restrict information from coworkers than family.
This document discusses a group research project on social media. The agenda includes conducting background research, a literature review, and developing individual research proposals. One proposal focuses on determining factors that influence young consumers' adoption of electronic word-of-mouth (e-WOM) via social media. While prior studies have examined motivations for generating e-WOM, little research has looked at what drives people to adopt or listen to e-WOM. The proposed study will use mixed methods to develop and test a model of the relationships between various information characteristics and the perceived usefulness and adoption of e-WOM among youth in New Zealand. The results could provide implications for how marketers promote brands via social media.
The Influence of Social Media Usage and Personality Traits on Personal Relati...YogeshIJTSRD
This study explored the influence of social media usage and personality traits on personal relationships and job performance. 207 Mongolian employees participated in the study. The results showed that the intensity of social media use had no significant influence on personal relationships or job performance. Extraversion and openness to experience were found to have a significant positive influence on personal relationships and job performance. Social media usage and extraversion were also found to have a significant positive effect on personal relationships.
The document summarizes a research initiative by the New Zealand AIDS Foundation to launch an online social networking site called Bro Online. The site aims to promote HIV prevention and condom use among gay and bisexual men. Bro Online uses features like user profiles, messaging, and discussion forums to encourage social interaction and experiences around condom use. The goal is to build a virtual "community of condom users" by empowering members and increasing feelings of social support and accountability. Research on social media, behavior change theories, and past online HIV prevention efforts informed the development of Bro Online. Initial results suggest it has been an effective way to normalize condom use and drive down new HIV diagnoses rates in New Zealand.
Sociological Research Methods – Group Research ProjectThe Ev.docxjensgosney
This document provides details for a group sociological research project examining the evolution of technology and its effects on human interactions and communications. It outlines the topic, goals of the study, and methodology. The study aims to discover how interactions between humans have changed with the rise of internet and electronic technology. It will use network ethnography, which allows observation of multiple online networks without limitations of traditional field sites. Follow-up interviews will also be conducted. The document discusses previous related studies and methodology used. It proposes examining how daily smart phone use impacts human relationships through texting, social media, privacy, and time spent on devices. The group will survey 500 smart phone users aged 16-46 and conduct detailed interviews. References several credible sources to
Influence of social media on the academic performance of the undergraduate st...Alexander Decker
1) The document examines the influence of social media on the academic performance of undergraduate students at Kogi State University in Nigeria. It finds that students have high levels of access to social media, especially Facebook.
2) The study also finds that exposure to social media has a negative effect on students' academic performance. Students spend more time on social media than studying, and rely on social media instead of course materials.
3) Based on these findings, the document concludes that social media exposure negatively impacts academic performance for undergraduates at Kogi State University. It recommends that students minimize social media use and focus more on academic activities.
An Empirical Study on Online Social Networks Sites Usage Online Dating Sites...Jessica Henderson
This study examines online social network and dating site usage among university students in Malaysia. It finds that Facebook is the most popular social network, used mainly for communication. Only 12% of students reported using online dating sites, seeking long-term relationships for females and casual relationships for males. The study provides insight into students' attitudes and experiences with online socializing and dating.
Usage of YouTube Content among Chennai Urban Women.pdfPugalendhiR
Abstract: The majority of YouTube users are college students, therefore it's critical to understand their usage patterns,
goals, and any potential psychological and behavioural effects. In order to determine the current trends in YouTube usage
among female undergraduate students in Chennai City, this study will examine the devices used, memberships subscribed
to, purposes used, and identity formation time spent networking, negative impacts experienced, and educational usage.
Data from a survey were analysed with SPSS-Statistic 19.0 software, and the findings were compared to the examined
literature. According to the survey, students' YouTube networking habits will eventually win out over parents' and
teachers' attitudes, and although while cell phones are currently prohibited in many college buildings, they will
undoubtedly be utilised in classrooms in the near future. The discoveries provide the current study in this area more depth.
This study examines how Facebook users manage their privacy and personal information disclosure based on Communication Privacy Management theory. A survey and content analysis were conducted to understand the relationship between perceptions of Facebook privacy and efforts to stay updated on privacy settings. The introduction provides background on social networking sites and how they have changed communication. Hypotheses are presented that Facebook users who use the site daily will be more concerned about privacy and more likely to hide or restrict information from coworkers than family.
This document discusses a group research project on social media. The agenda includes conducting background research, a literature review, and developing individual research proposals. One proposal focuses on determining factors that influence young consumers' adoption of electronic word-of-mouth (e-WOM) via social media. While prior studies have examined motivations for generating e-WOM, little research has looked at what drives people to adopt or listen to e-WOM. The proposed study will use mixed methods to develop and test a model of the relationships between various information characteristics and the perceived usefulness and adoption of e-WOM among youth in New Zealand. The results could provide implications for how marketers promote brands via social media.
The Influence of Social Media Usage and Personality Traits on Personal Relati...YogeshIJTSRD
This study explored the influence of social media usage and personality traits on personal relationships and job performance. 207 Mongolian employees participated in the study. The results showed that the intensity of social media use had no significant influence on personal relationships or job performance. Extraversion and openness to experience were found to have a significant positive influence on personal relationships and job performance. Social media usage and extraversion were also found to have a significant positive effect on personal relationships.
The document summarizes a research initiative by the New Zealand AIDS Foundation to launch an online social networking site called Bro Online. The site aims to promote HIV prevention and condom use among gay and bisexual men. Bro Online uses features like user profiles, messaging, and discussion forums to encourage social interaction and experiences around condom use. The goal is to build a virtual "community of condom users" by empowering members and increasing feelings of social support and accountability. Research on social media, behavior change theories, and past online HIV prevention efforts informed the development of Bro Online. Initial results suggest it has been an effective way to normalize condom use and drive down new HIV diagnoses rates in New Zealand.
Sociological Research Methods – Group Research ProjectThe Ev.docxjensgosney
This document provides details for a group sociological research project examining the evolution of technology and its effects on human interactions and communications. It outlines the topic, goals of the study, and methodology. The study aims to discover how interactions between humans have changed with the rise of internet and electronic technology. It will use network ethnography, which allows observation of multiple online networks without limitations of traditional field sites. Follow-up interviews will also be conducted. The document discusses previous related studies and methodology used. It proposes examining how daily smart phone use impacts human relationships through texting, social media, privacy, and time spent on devices. The group will survey 500 smart phone users aged 16-46 and conduct detailed interviews. References several credible sources to
Influence of social media on the academic performance of the undergraduate st...Alexander Decker
1) The document examines the influence of social media on the academic performance of undergraduate students at Kogi State University in Nigeria. It finds that students have high levels of access to social media, especially Facebook.
2) The study also finds that exposure to social media has a negative effect on students' academic performance. Students spend more time on social media than studying, and rely on social media instead of course materials.
3) Based on these findings, the document concludes that social media exposure negatively impacts academic performance for undergraduates at Kogi State University. It recommends that students minimize social media use and focus more on academic activities.
Digital Transformation in Higher Education – New Cohorts, New Requirements?. ...eraser Juan José Calderón
The document discusses digital transformation in higher education and how usage of digital platforms differs between groups in a university setting. A qualitative study was conducted through semi-structured interviews of bachelor students, master students, PhD students, and employees. The interviews aimed to understand how factors like team experience, task complexity, and technology accessibility influence platform usage. Preliminary results found bachelor and master students prefer social media for collaboration while PhD students and employees do not, and communication between groups still relies heavily on email.
Online social networking and the academic achievement of university students ...Alexander Decker
This document examines the relationship between online social networking and the academic achievement of university students in selected Nigerian universities. It discusses several studies that have investigated social networking usage patterns and effects. The study aimed to determine if relationships exist between academic achievement and time spent on social networking sites, gender differences in usage, and differences between universities. A questionnaire was administered to 400 students across 3 universities to collect data on social networking usage and academic performance. Statistical analysis found significant relationships between academic achievement and time spent online, as well as differences related to gender and university attended.
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...Kasthuripriya Nanda Kumar
This document is a research paper that examines the effects of social networking sites on the academic performance of college students. It begins with background information on the rise of social networking and introduces the research problem of whether these sites impact students' grades. The purpose is to determine this impact through a study of 30 students at Taj International College. A literature review discusses previous research, which has found mixed results on whether time spent on social networking correlates with academic performance.
This study examined internet abuse among Turkish teenagers and its relationship to internet usage patterns and demographics. The researchers collected data via questionnaire from 1380 high school students. They found that a small portion were considered internet abusers experiencing severe problems, while one fourth experienced occasional problems. Excessive use, tolerance, preoccupation, and using the internet to escape negative feelings were the most common symptoms of disturbed online behavior. Internet abuse differed based on gender, perceived academic achievement, frequency of use, place of use, and purpose of use, but not socioeconomic status or type of school.
The document discusses utilizing weight allocation in a term frequency-inverse document frequency (TF-IDF) environment to identify and remove noisy data from social media for improved customer segmentation and targeted advertising. Specifically, it aims to recognize keywords that can help cluster social media users based on demographics and behaviors while eliminating uninfluential data. The approach assigns higher weight to words that frequently appear in a document but rarely in the entire collection compared to common words.
This document outlines a workshop series aimed at educating college students on protecting their cyber reputation by discovering, creating, and maintaining a positive online presence through proper use of social media and awareness of the long term effects their digital footprint can have on academic and professional pursuits. The workshops cover finding one's online information, privacy settings on Facebook, creating a LinkedIn profile, and removing unwanted cyber content to help students understand and manage their cyber reputation.
This study aims to assess the influence of social media usage on the divorce rate among young married couples in Ghana. The increasing use of social media has both benefits and drawbacks for families. While it facilitates communication, social media usage among youth may limit in-person interactions between partners and reduce privacy. The study seeks to evaluate the extent of social media use among young married Ghanian couples, how it impacts their marital roles, and how it influences decisions to divorce. A literature review will cover the history of social media, concepts of marriage, gender and age differences in social media usage, and the impact on marital communication. Data will be collected through questionnaires administered to married partners and singles in East Legon, Accra. The findings
The use of social media in the recruitment processBhagyashree Zope
This document summarizes a study on the use of social media in the recruitment process. It finds that over half of UK jobseekers now use social media sites like Facebook and LinkedIn to search for jobs. While social media offers opportunities to efficiently target candidates, there are also risks around privacy, discrimination, and bias. Employers need to consider how to handle personal information found online and avoid letting non-job related factors influence hiring decisions. The study examines the costs and benefits of using social media, common tools and practices, and risks to both employers and candidates. It aims to understand how social media is changing recruitment and provide advice on related legal and policy issues.
The use-of-social-media-in-the-recruitment-processPreeti Bhaskar
This document summarizes a study on the use of social media in recruitment conducted by the Institute for Employment Studies (IES) for the UK's Advisory, Conciliation and Arbitration Service (Acas). The study aimed to understand how and why employers use social media tools for recruitment, the perceived costs and benefits, and the legal and reputational risks. It involved a literature review and case studies with Pets at Home, G4S, and Monmouthshire County Council. The study found that employers use social media mainly for candidate screening and marketing, though there are risks around privacy, discrimination, and bias. Employers must develop policies around social media use in recruitment to manage these risks.
Profiling employees online: shifting public–private
boundaries in organisational life
Paula McDonald, Queensland University of Technology
Paul Thompson, Stirling University, Queensland University of Technology
Peter O’Connor, Queensland University of Technology
Human Resource Management Journal, Vol 26, no 4, 2016, pages 541–556
Profiling involves the collection and use of online information about prospective and current employees to
evaluate their fitness for and in the job. Workplace and legal studies suggest an expanded use of profiling
and significant legal/professional implications for HRM practitioners, yet scant attention has been afforded
to the boundaries of such practices. In this study, profiling is framed as a terrain on which employees and
employers assert asymmetrical interests. Using survey data from large samples in Australia and the UK, the
study investigates the prevalence and outcomes of profiling; the extent to which employees assert a right to
privacy versus employer rights to engage in profiling; the extent to which organisations codify profiling
practices; and employee responses in protecting online information. The findings contribute to a small and
emerging body of evidence addressing how social media conduct at work is reconstituting and reshaping the
boundaries between public and private spheres.
Contact: Professor Paula McDonald, Queensland University of Technology, PO Box 2434, Brisbane,
Qld 4001, Australia. Email: [email protected]
Keywords: profiling; public–private boundaries; social media at work; employee privacy
INTRODUCTION
T
he peer reviewed literature and popular media have reported the increasing use of
‘profiling’ by employers and HRM practitioners. Profiling, as defined in this article,
refers to the collection of online information, often via social networking sites or generic
search engines, for the purpose of evaluating prospective employees and monitoring current
employees with regards to their fitness for and in the job. Information gathered through
profiling which is of potential interest to employers includes inappropriate comments or text,
membership of certain groups and networks, communication skills, education, work history,
professional affiliations, interests and lifestyle choices (Kluemper, 2013; Whitehall, 2012).
Access to such information from employees’ online personas considerably extends traditional
forms of evidence derived from reference checks and criminal background searches. This is
because social exchange in an online environment which, although similar to traditional offline
communication in that social interactions take place and information is exchanged, involves
conversations which are preserved and subsequently accessible by others, including employers
(Clark and Roberts, 2010).
Profiling has significant legal, ethical and professional implications for HRM practitioners
(Davison et al., 2012), yet there has been relatively little discussion in the HRM literature its.
Corporate Communication & Social Media: A study of its usage patterninventionjournals
This document summarizes a research study that examined how corporate communication professionals use social media. The study found that Facebook, Twitter, and LinkedIn were most used for corporate communication purposes like employee communication, customer relations, and media relations. The majority of messages shared on social media were about company events, achievements, news, promotions, and CSR activities. While social media is an important tool, the study found that some companies have not fully utilized its potential for corporate communication.
Theory-Based Formative Research on an Anti-CyberbullyingVict.docxlillie234567
Theory-Based Formative Research on an Anti-Cyberbullying
Victimization Intervention Message
MATTHEW W. SAVAGE1, DOUGLAS M. DEISS, JR.2, ANTHONY J. ROBERTO3, and ELIAS ABOUJAOUDE4
1School of Communication, San Diego State University, San Diego, California, USA
2Department of Communication and World Languages, Glendale Community College, Glendale, Arizona, USA
3Hugh Downs School of Human Communication, Arizona State University, Tempe, Arizona, USA
4Department of Psychiatry and Behavioral Sciences, Stanford University, Stanford, California, USA
Cyberbullying is a common byproduct of the digital revolution with serious consequences to victims. Unfortunately, there is a dearth of
empirically basedmethods to confront it. This study used social cognitive theory to design and test an interventionmessage aimed at persuading
college students to abstain from retaliation, seek social support, save evidence, and notify authorities—important victim responses identified
and recommended in previous research. Using a posttest-only control group design, this study tested the effectiveness of an intervention
message in changing college students’ perceived susceptibility to and perceived severity of cyberbullying as well as their self-efficacy, response
efficacy, attitudes, and behavioral intentions toward each recommended response in future episodes of cyberbullying. Results indicated that the
intervention message caused participants in the experimental condition to report significantly higher susceptibility, but not perceived severity, to
cyberbullying than those in the control condition. The intervention message also caused expected changes in all outcomes except self-efficacy
for not retaliating and in all outcomes for seeking social support, saving evidence, and notifying an authority. Implications for message design
and future research supporting evidence-based anti-cyberbullying health communication campaigns are discussed.
Cyberbullying is a serious public health concern (Centers for
Disease Control and Prevention, 2016). Emphasizing the
communicative aspect of cyberbullying, Roberto and Eden
(2010) defined it as the “deliberate and repeated misuse of
communication technology by an individual or group to
threaten or harm others” (p. 201). As a problem of modern
life, cyberbullying has garnered significant attention. The
general media initially recognized tragic cases of cyberbully-
ing-related suicides (e.g., Alvarez, 2013; BBC News, 2014;
Stelter, 2008). Scholarly work has since produced a relatively
large body of data highlighting the widespread dangerous
nature of the behavior (Kowalski, Giumetti, Schroeder, &
Lattanner, 2014).
Although most studies have focused on minors, cyberbullying
can occur from elementary school to college. Among adolescents,
cyberbullying victimization rates range from 20% to 40% (Moreno,
2014; Tokunaga, 2010). Studies of college students show similar
rates (Crosslin & Golman, 2014; Foody, Samara, & Carlbring,
2015; Zalaqu.
This document summarizes a research study that analyzed factors influencing consumer subscription rates for various social networking sites like Facebook, LinkedIn, Twitter, and Google+. Through surveys and statistical analysis, the researchers identified several key factors that positively influence user attitudes and intentions to use social networks. These included applications, security/privacy features, ability to create a personal image, and level of interactivity. The study found that Facebook in particular benefits from factors like entertainment applications, photo sharing, and status as a trend or style statement among young users.
Project Part 1ITT-TechShawn EngbretsonThe Effect o.docxwkyra78
Project Part 1
ITT-Tech
Shawn Engbretson
The Effect of Internet Usage on Marriage
Introduction
The rapid growth of internet usage over the last two decades has been influencing many aspects of our life and most noticeably the ways in which people communicate with each other. Therefore, it is appropriate to ask whether the growth of internet usage influences individuals’ marital decisions in modern society. This study will concentrate on the effect of the growing internet usage on marriage.
Over the last two decades, the internet has become truly widespread, and there is no doubt that this new means of communication influence and profoundly changed many substantial aspects of our lives. Email usage became standard, online dating sites multiplies, social networks’ popularity has been spectacularly growing, all giving evidence of the of the noteworthy role that online communication plays in our lives nowadays and of the very different opportunities we have now as compared to the situation some twenty years ago.
The young people are the most likely to exploit fully these opportunities, and there are several ways in which the means of online communication may make their life both easier and richer as compared to the generation of their parents. Easier from the point of view that search for a life partner does not have to be only in the real world, but might be countered on the internet. There are enough examples of happy couples that met for the first time on a social network, a discussion forum or other web platform, or who found each other directly through the services of an online dating site.
This shows just how these successfully formed partnerships have changed our lives in a way or another. The study, the effect of internet usage on marriage, would also help shed some light on the effect of the increasing internet usage on the divorce rate. There are certainly many aspects of marriage that internet usage can influence, but this study will concentrate mostly on the beginning of the marital process. It will particularly try to establish if the reduction of search costs, given by the fact that through the internet, more potential partners can be reached in a significantly shorter time, leads people to marry sooner or later.
I chose this study as way of trying to complement the already growing numbers of studies done on this topic both from a sociological an economic point of view. It will primarily be positioned within the economic stream of literature and by doing so; present an econometric approach that makes it possible to ascertain the effect of an increasing internet usage on individuals’ marital decisions. To be able to achieve this using IT as leverage to provide answers to the various questions that arise sums up all the reasons as to why I settled for this topic.
Literature Review
The propagation of the internet and the consequent enrichment of the means of communication bring one of the biggest changes ever t ...
A Literature Review On The Business Impacts Of Social Network SitesAmanda Summers
This document presents a literature review on the business impacts of social network sites (SNSs). It analyzes 28 journal articles published between 2000-2011. The articles are classified into six categories of SNS applications in business: marketing and advertising, knowledge management, social capital, relationship management, e-commerce, and economic model. The review finds that marketing and advertising was the most common category discussed. It aims to provide guidance to managers and academics on how SNSs can impact businesses.
This study aimed to determine if a social media intervention could encourage environmentally responsible behavior among students. The researcher created a Facebook group for students living in a dorm to reduce their waste in food, water, energy, and solid waste over 3 weeks. Surveys before and after measured conservation behavior, identity, and campus norms. The preliminary results found the social media intervention had a minimal impact on reducing waste among the 29 participants. This suggests social media alone may be ineffective for encouraging conservation behavior change, though more engagement was needed.
Based on your course reading assignments and your pending research p.docxcherishwinsland
Based on your course reading assignments and your pending research problem, what type of study do you believe you are conducting, and please explain why?
Extra materials:
Descriptive
research
is a study designed to depict the participants in an accurate way. More simply put, descriptive analysis is all about describing people who take part in the survey.
There are three ways a researcher can go about doing a descriptive research project, and they are:
Observational, defined as a method of viewing and recording the participants
Case study, defined as an in-depth study of an individual or group of individuals
Survey, defined as a brief interview or discussion with an individual about a specific topic
Mixed
methods
research
(Extracted from the article below) is the use of quantitative and qualitative methods in a single study or series of studies. It is a new methodology that is increasingly used by health researchers, especially within health services research. There is a growing literature on the theory, design, and critical appraisal of mixed methods research. However, few papers summarize this methodological approach for health practitioners who wish to conduct or critically engage with mixed methods studies.
Article: Using Mixed Methods in Health Research
Meta-Analysis
Meta
-
analysis
is a statistical technique for combining data from multiple studies on a particular topic. A Meta-analysis is an analytical tool for estimating the mean and variance of underlying population effects from a collection of empirical studies addressing ostensibly the same research question. Meta‐analysis has become an increasingly popular and valuable tool in psychological research, and significant review articles typically employ these methods.
Article: Meta-Analysis in Medical Research
Epidemiology
According to the Centers for Disease Control,
Epidemiology
is the method used to find the causes of health outcomes and diseases in populations. In epidemiology, the patient is the community and individuals are viewed collectively. By definition, epidemiology is the study (scientific, systematic, and data-driven) of the distribution (frequency, pattern) and determinants (causes, risk factors) of health-related states and events (not just diseases) in specified populations (neighborhood, school, city, state, country, global).
Article: Epidemiology is a Science of High Importance
Longitudinal Studies
Longitudinal Study, an epidemiologic study that follows a population forward over time, evaluating the effects of one or more variables on a process. If individuals are followed, it is termed a longitudinal cohort study. If classes—e.g., age classes—are studied, it is a longitudinal cross-sectional study. Longitudinal studies are the converse (opposite) of horizontal (parallel) studies.
Article Longitudinal Studies
.
Based on yesterday Assignment (Green Machine)1. Provide a Com.docxcherishwinsland
The document provides instructions for an assignment to analyze competitors in the green machine industry. Students are asked to assess the overall industry strategy, describe each major competitor's current marketing positioning and strategy, and identify the main sources of competitive advantage for each key rival firm.
More Related Content
Similar to O R I G I N A L P A P E R‘‘It just crept in’’ The Digital.docx
Digital Transformation in Higher Education – New Cohorts, New Requirements?. ...eraser Juan José Calderón
The document discusses digital transformation in higher education and how usage of digital platforms differs between groups in a university setting. A qualitative study was conducted through semi-structured interviews of bachelor students, master students, PhD students, and employees. The interviews aimed to understand how factors like team experience, task complexity, and technology accessibility influence platform usage. Preliminary results found bachelor and master students prefer social media for collaboration while PhD students and employees do not, and communication between groups still relies heavily on email.
Online social networking and the academic achievement of university students ...Alexander Decker
This document examines the relationship between online social networking and the academic achievement of university students in selected Nigerian universities. It discusses several studies that have investigated social networking usage patterns and effects. The study aimed to determine if relationships exist between academic achievement and time spent on social networking sites, gender differences in usage, and differences between universities. A questionnaire was administered to 400 students across 3 universities to collect data on social networking usage and academic performance. Statistical analysis found significant relationships between academic achievement and time spent online, as well as differences related to gender and university attended.
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...Kasthuripriya Nanda Kumar
This document is a research paper that examines the effects of social networking sites on the academic performance of college students. It begins with background information on the rise of social networking and introduces the research problem of whether these sites impact students' grades. The purpose is to determine this impact through a study of 30 students at Taj International College. A literature review discusses previous research, which has found mixed results on whether time spent on social networking correlates with academic performance.
This study examined internet abuse among Turkish teenagers and its relationship to internet usage patterns and demographics. The researchers collected data via questionnaire from 1380 high school students. They found that a small portion were considered internet abusers experiencing severe problems, while one fourth experienced occasional problems. Excessive use, tolerance, preoccupation, and using the internet to escape negative feelings were the most common symptoms of disturbed online behavior. Internet abuse differed based on gender, perceived academic achievement, frequency of use, place of use, and purpose of use, but not socioeconomic status or type of school.
The document discusses utilizing weight allocation in a term frequency-inverse document frequency (TF-IDF) environment to identify and remove noisy data from social media for improved customer segmentation and targeted advertising. Specifically, it aims to recognize keywords that can help cluster social media users based on demographics and behaviors while eliminating uninfluential data. The approach assigns higher weight to words that frequently appear in a document but rarely in the entire collection compared to common words.
This document outlines a workshop series aimed at educating college students on protecting their cyber reputation by discovering, creating, and maintaining a positive online presence through proper use of social media and awareness of the long term effects their digital footprint can have on academic and professional pursuits. The workshops cover finding one's online information, privacy settings on Facebook, creating a LinkedIn profile, and removing unwanted cyber content to help students understand and manage their cyber reputation.
This study aims to assess the influence of social media usage on the divorce rate among young married couples in Ghana. The increasing use of social media has both benefits and drawbacks for families. While it facilitates communication, social media usage among youth may limit in-person interactions between partners and reduce privacy. The study seeks to evaluate the extent of social media use among young married Ghanian couples, how it impacts their marital roles, and how it influences decisions to divorce. A literature review will cover the history of social media, concepts of marriage, gender and age differences in social media usage, and the impact on marital communication. Data will be collected through questionnaires administered to married partners and singles in East Legon, Accra. The findings
The use of social media in the recruitment processBhagyashree Zope
This document summarizes a study on the use of social media in the recruitment process. It finds that over half of UK jobseekers now use social media sites like Facebook and LinkedIn to search for jobs. While social media offers opportunities to efficiently target candidates, there are also risks around privacy, discrimination, and bias. Employers need to consider how to handle personal information found online and avoid letting non-job related factors influence hiring decisions. The study examines the costs and benefits of using social media, common tools and practices, and risks to both employers and candidates. It aims to understand how social media is changing recruitment and provide advice on related legal and policy issues.
The use-of-social-media-in-the-recruitment-processPreeti Bhaskar
This document summarizes a study on the use of social media in recruitment conducted by the Institute for Employment Studies (IES) for the UK's Advisory, Conciliation and Arbitration Service (Acas). The study aimed to understand how and why employers use social media tools for recruitment, the perceived costs and benefits, and the legal and reputational risks. It involved a literature review and case studies with Pets at Home, G4S, and Monmouthshire County Council. The study found that employers use social media mainly for candidate screening and marketing, though there are risks around privacy, discrimination, and bias. Employers must develop policies around social media use in recruitment to manage these risks.
Profiling employees online: shifting public–private
boundaries in organisational life
Paula McDonald, Queensland University of Technology
Paul Thompson, Stirling University, Queensland University of Technology
Peter O’Connor, Queensland University of Technology
Human Resource Management Journal, Vol 26, no 4, 2016, pages 541–556
Profiling involves the collection and use of online information about prospective and current employees to
evaluate their fitness for and in the job. Workplace and legal studies suggest an expanded use of profiling
and significant legal/professional implications for HRM practitioners, yet scant attention has been afforded
to the boundaries of such practices. In this study, profiling is framed as a terrain on which employees and
employers assert asymmetrical interests. Using survey data from large samples in Australia and the UK, the
study investigates the prevalence and outcomes of profiling; the extent to which employees assert a right to
privacy versus employer rights to engage in profiling; the extent to which organisations codify profiling
practices; and employee responses in protecting online information. The findings contribute to a small and
emerging body of evidence addressing how social media conduct at work is reconstituting and reshaping the
boundaries between public and private spheres.
Contact: Professor Paula McDonald, Queensland University of Technology, PO Box 2434, Brisbane,
Qld 4001, Australia. Email: [email protected]
Keywords: profiling; public–private boundaries; social media at work; employee privacy
INTRODUCTION
T
he peer reviewed literature and popular media have reported the increasing use of
‘profiling’ by employers and HRM practitioners. Profiling, as defined in this article,
refers to the collection of online information, often via social networking sites or generic
search engines, for the purpose of evaluating prospective employees and monitoring current
employees with regards to their fitness for and in the job. Information gathered through
profiling which is of potential interest to employers includes inappropriate comments or text,
membership of certain groups and networks, communication skills, education, work history,
professional affiliations, interests and lifestyle choices (Kluemper, 2013; Whitehall, 2012).
Access to such information from employees’ online personas considerably extends traditional
forms of evidence derived from reference checks and criminal background searches. This is
because social exchange in an online environment which, although similar to traditional offline
communication in that social interactions take place and information is exchanged, involves
conversations which are preserved and subsequently accessible by others, including employers
(Clark and Roberts, 2010).
Profiling has significant legal, ethical and professional implications for HRM practitioners
(Davison et al., 2012), yet there has been relatively little discussion in the HRM literature its.
Corporate Communication & Social Media: A study of its usage patterninventionjournals
This document summarizes a research study that examined how corporate communication professionals use social media. The study found that Facebook, Twitter, and LinkedIn were most used for corporate communication purposes like employee communication, customer relations, and media relations. The majority of messages shared on social media were about company events, achievements, news, promotions, and CSR activities. While social media is an important tool, the study found that some companies have not fully utilized its potential for corporate communication.
Theory-Based Formative Research on an Anti-CyberbullyingVict.docxlillie234567
Theory-Based Formative Research on an Anti-Cyberbullying
Victimization Intervention Message
MATTHEW W. SAVAGE1, DOUGLAS M. DEISS, JR.2, ANTHONY J. ROBERTO3, and ELIAS ABOUJAOUDE4
1School of Communication, San Diego State University, San Diego, California, USA
2Department of Communication and World Languages, Glendale Community College, Glendale, Arizona, USA
3Hugh Downs School of Human Communication, Arizona State University, Tempe, Arizona, USA
4Department of Psychiatry and Behavioral Sciences, Stanford University, Stanford, California, USA
Cyberbullying is a common byproduct of the digital revolution with serious consequences to victims. Unfortunately, there is a dearth of
empirically basedmethods to confront it. This study used social cognitive theory to design and test an interventionmessage aimed at persuading
college students to abstain from retaliation, seek social support, save evidence, and notify authorities—important victim responses identified
and recommended in previous research. Using a posttest-only control group design, this study tested the effectiveness of an intervention
message in changing college students’ perceived susceptibility to and perceived severity of cyberbullying as well as their self-efficacy, response
efficacy, attitudes, and behavioral intentions toward each recommended response in future episodes of cyberbullying. Results indicated that the
intervention message caused participants in the experimental condition to report significantly higher susceptibility, but not perceived severity, to
cyberbullying than those in the control condition. The intervention message also caused expected changes in all outcomes except self-efficacy
for not retaliating and in all outcomes for seeking social support, saving evidence, and notifying an authority. Implications for message design
and future research supporting evidence-based anti-cyberbullying health communication campaigns are discussed.
Cyberbullying is a serious public health concern (Centers for
Disease Control and Prevention, 2016). Emphasizing the
communicative aspect of cyberbullying, Roberto and Eden
(2010) defined it as the “deliberate and repeated misuse of
communication technology by an individual or group to
threaten or harm others” (p. 201). As a problem of modern
life, cyberbullying has garnered significant attention. The
general media initially recognized tragic cases of cyberbully-
ing-related suicides (e.g., Alvarez, 2013; BBC News, 2014;
Stelter, 2008). Scholarly work has since produced a relatively
large body of data highlighting the widespread dangerous
nature of the behavior (Kowalski, Giumetti, Schroeder, &
Lattanner, 2014).
Although most studies have focused on minors, cyberbullying
can occur from elementary school to college. Among adolescents,
cyberbullying victimization rates range from 20% to 40% (Moreno,
2014; Tokunaga, 2010). Studies of college students show similar
rates (Crosslin & Golman, 2014; Foody, Samara, & Carlbring,
2015; Zalaqu.
This document summarizes a research study that analyzed factors influencing consumer subscription rates for various social networking sites like Facebook, LinkedIn, Twitter, and Google+. Through surveys and statistical analysis, the researchers identified several key factors that positively influence user attitudes and intentions to use social networks. These included applications, security/privacy features, ability to create a personal image, and level of interactivity. The study found that Facebook in particular benefits from factors like entertainment applications, photo sharing, and status as a trend or style statement among young users.
Project Part 1ITT-TechShawn EngbretsonThe Effect o.docxwkyra78
Project Part 1
ITT-Tech
Shawn Engbretson
The Effect of Internet Usage on Marriage
Introduction
The rapid growth of internet usage over the last two decades has been influencing many aspects of our life and most noticeably the ways in which people communicate with each other. Therefore, it is appropriate to ask whether the growth of internet usage influences individuals’ marital decisions in modern society. This study will concentrate on the effect of the growing internet usage on marriage.
Over the last two decades, the internet has become truly widespread, and there is no doubt that this new means of communication influence and profoundly changed many substantial aspects of our lives. Email usage became standard, online dating sites multiplies, social networks’ popularity has been spectacularly growing, all giving evidence of the of the noteworthy role that online communication plays in our lives nowadays and of the very different opportunities we have now as compared to the situation some twenty years ago.
The young people are the most likely to exploit fully these opportunities, and there are several ways in which the means of online communication may make their life both easier and richer as compared to the generation of their parents. Easier from the point of view that search for a life partner does not have to be only in the real world, but might be countered on the internet. There are enough examples of happy couples that met for the first time on a social network, a discussion forum or other web platform, or who found each other directly through the services of an online dating site.
This shows just how these successfully formed partnerships have changed our lives in a way or another. The study, the effect of internet usage on marriage, would also help shed some light on the effect of the increasing internet usage on the divorce rate. There are certainly many aspects of marriage that internet usage can influence, but this study will concentrate mostly on the beginning of the marital process. It will particularly try to establish if the reduction of search costs, given by the fact that through the internet, more potential partners can be reached in a significantly shorter time, leads people to marry sooner or later.
I chose this study as way of trying to complement the already growing numbers of studies done on this topic both from a sociological an economic point of view. It will primarily be positioned within the economic stream of literature and by doing so; present an econometric approach that makes it possible to ascertain the effect of an increasing internet usage on individuals’ marital decisions. To be able to achieve this using IT as leverage to provide answers to the various questions that arise sums up all the reasons as to why I settled for this topic.
Literature Review
The propagation of the internet and the consequent enrichment of the means of communication bring one of the biggest changes ever t ...
A Literature Review On The Business Impacts Of Social Network SitesAmanda Summers
This document presents a literature review on the business impacts of social network sites (SNSs). It analyzes 28 journal articles published between 2000-2011. The articles are classified into six categories of SNS applications in business: marketing and advertising, knowledge management, social capital, relationship management, e-commerce, and economic model. The review finds that marketing and advertising was the most common category discussed. It aims to provide guidance to managers and academics on how SNSs can impact businesses.
This study aimed to determine if a social media intervention could encourage environmentally responsible behavior among students. The researcher created a Facebook group for students living in a dorm to reduce their waste in food, water, energy, and solid waste over 3 weeks. Surveys before and after measured conservation behavior, identity, and campus norms. The preliminary results found the social media intervention had a minimal impact on reducing waste among the 29 participants. This suggests social media alone may be ineffective for encouraging conservation behavior change, though more engagement was needed.
Based on your course reading assignments and your pending research p.docxcherishwinsland
Based on your course reading assignments and your pending research problem, what type of study do you believe you are conducting, and please explain why?
Extra materials:
Descriptive
research
is a study designed to depict the participants in an accurate way. More simply put, descriptive analysis is all about describing people who take part in the survey.
There are three ways a researcher can go about doing a descriptive research project, and they are:
Observational, defined as a method of viewing and recording the participants
Case study, defined as an in-depth study of an individual or group of individuals
Survey, defined as a brief interview or discussion with an individual about a specific topic
Mixed
methods
research
(Extracted from the article below) is the use of quantitative and qualitative methods in a single study or series of studies. It is a new methodology that is increasingly used by health researchers, especially within health services research. There is a growing literature on the theory, design, and critical appraisal of mixed methods research. However, few papers summarize this methodological approach for health practitioners who wish to conduct or critically engage with mixed methods studies.
Article: Using Mixed Methods in Health Research
Meta-Analysis
Meta
-
analysis
is a statistical technique for combining data from multiple studies on a particular topic. A Meta-analysis is an analytical tool for estimating the mean and variance of underlying population effects from a collection of empirical studies addressing ostensibly the same research question. Meta‐analysis has become an increasingly popular and valuable tool in psychological research, and significant review articles typically employ these methods.
Article: Meta-Analysis in Medical Research
Epidemiology
According to the Centers for Disease Control,
Epidemiology
is the method used to find the causes of health outcomes and diseases in populations. In epidemiology, the patient is the community and individuals are viewed collectively. By definition, epidemiology is the study (scientific, systematic, and data-driven) of the distribution (frequency, pattern) and determinants (causes, risk factors) of health-related states and events (not just diseases) in specified populations (neighborhood, school, city, state, country, global).
Article: Epidemiology is a Science of High Importance
Longitudinal Studies
Longitudinal Study, an epidemiologic study that follows a population forward over time, evaluating the effects of one or more variables on a process. If individuals are followed, it is termed a longitudinal cohort study. If classes—e.g., age classes—are studied, it is a longitudinal cross-sectional study. Longitudinal studies are the converse (opposite) of horizontal (parallel) studies.
Article Longitudinal Studies
.
Based on yesterday Assignment (Green Machine)1. Provide a Com.docxcherishwinsland
The document provides instructions for an assignment to analyze competitors in the green machine industry. Students are asked to assess the overall industry strategy, describe each major competitor's current marketing positioning and strategy, and identify the main sources of competitive advantage for each key rival firm.
Based on what youve learned from the material on incidental teachin.docxcherishwinsland
Based on what you've learned from the material on incidental teaching, in a two page (minimum) double spaced paper, describe in detail how you would implement an incidentaI teaching model in a preschool classroom with 10 children. Include: methods of target behavior identification, methods of reinforcement, and expected outcomes as a result of IT implementation.
.
Based on what you have learned related to cybercrime and technol.docxcherishwinsland
Based on what you have learned related to cybercrime and technology, write 2 pages outlining your opinion of what might happen in the future with the emergence of artificial intelligence and/or autonomous vehicles (any kind) and other emerging technologies.
What kind of crimes do you think might be possible?
How might our legal system have to change in order to keep up?
Do we need stricter laws or better technology? or both?
.
Based on what you have learned in this class, write a letter to a fu.docxcherishwinsland
Based on what you have learned in this class, write a letter to a future employer that explains how religion, language, philosophy, material culture, non-material culture, and/or interaction with the environment have shaped the origins and evolution of world civilizations. Please provide at least two concrete examples.
pick on and write about it. 3 pages
.
Based on what you have learned about using unified communication.docxcherishwinsland
Based on what you have learned about using unified communication platforms in a collaborative environment,
create
a 5-slide presentation to a department head or the CEO of a company to convince the audience that this would benefit their business.
Remember to use this format:
Introduction
State the business problem
The current set up
What is Unified Communication Platforms
State how Unified Communication Platforms will help the business
Cite at least two apps that are part of Unified Communication Platforms that is recommended by you
Cost of moving to Unified Communication Platform
Conclusion
Click
the Assignment Files tab to submit your assignment.
.
Based on what you have learned about using cloud-based office pr.docxcherishwinsland
Based on what you have learned about using cloud-based office productivity software,
create
a 5-slide presentation to the department head or CEO to convince him or her that using a cloud-based office productivity suite would benefit the company.
Include
the following in your presentation:
The stated business problem
The current set up
The benefits of moving to the cloud:
The benefits of collaboration
The difference moving to the cloud will be over current practice
Cost of moving to the cloud
Be sure that you also
include
an Introduction and Conclusion slide, along with graphics, Speaker Notes, and a properly formatted APA Reference slide.
Click
the Assignment Files tab to submit your assignment.
.
Based on week 13 reading assignment wh,describe an IT or simil.docxcherishwinsland
Based on week 13 reading assignment wh,
describe an IT or similar business project you have done or are currently doing. In your discussion, provide information on the following:
1. What is that project? Provide complete description.
2. What was the scope, deliverable, and results of the project?
3. What constraints did you experience and how did you handle them?
4. If you had to do the same project again, what changes will you recommend?
Week 13 reading assignment attached
.
Based on the video, how do we make ourselves vulnerable or not so vu.docxcherishwinsland
Based on the video, how do we make ourselves vulnerable or not so vulnerable with decision-making. Sometimes do we try to make the uncertain, certain, by making a decision without the facts and taking into consideration everyone's perspective of the decision at hand? Do we pretend that the other perspective doesn't even exist when we are making decisions?
https://www.ted.com/talks/brene_brown_the_power_of_vulnerability/up-next
.
Based on the video (specifically Section 1 Understanding the Comm.docxcherishwinsland
Based on the video (specifically Section 1:
Understanding the Communications Plan
) think of a presentation or proposal you have given or observed, or may be giving in the future, and complete a Stakeholder Register (
Stakeholder Register example
). Requirements include a brief synopsis of the presentation or proposal (1 page maximum) and a completed register. You may use whatever format for the register (word document, spreadsheet, etc.) that is convenient
.
Based on the texts by Kafka and Eliot, (writing on one or the other .docxcherishwinsland
Based on the texts by Kafka and Eliot, (writing on one or the other or both), discuss how the writers seem critical of modern culture, as they portray modern man as a self-conscious functionary who fears an acute loss of spirituality and identity, as well as the ability to achieve authenticity and happiness, overcome by the dehumanizing forces of industrialization and capitalism in post-WWI Europe.
- at least 700 words.
- MLA style
.
Based on the texts by Kafka and Eliot, (writing on one or the ot.docxcherishwinsland
Based on the texts by Kafka and Eliot, (writing on one or the other or both), discuss how the writers seem critical of modern culture, as they portray modern man as a self-conscious functionary who fears an acute loss of spirituality and identity, as well as the ability to achieve authenticity and happiness, overcome by the dehumanizing forces of industrialization and capitalism in post-WWI Europe.
.
Based on the techniques discussed for hiding data on a computer, w.docxcherishwinsland
Based on the techniques discussed for hiding data on a computer, which method would you use for the following:
Hiding information from a young family member who uses the same computer
Hiding information from a colleague who is a network administrator
Hiding information from an intelligence agency, such as the CIA
data hiding techniques
: -
1.hide in the properties
2.rename/change extension
3.steganography
4.hash
5.encryption
6.bit shifting
.
Based on the readings, there are specific components that encompass .docxcherishwinsland
Based on the readings, there are specific components that encompass SW-PBIS. Please describe any additional components that you think should also be included in the SW-PBIS plan. State why you think this(these) component(s) should be included.
An initial posting of roughly 150 words is due by January 12th.
.
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docxcherishwinsland
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ and ‘Emerging Urban Form of Accra’, identify and describe emerging URBAN spatial patterns in the United States, Shanghai (China) and Accra (Ghana) under globalization.
Instructions. This is a 3-2-paragraph essay and should fit onto one page, 1.5 spacing and 1-inch margins (About 400 words).
Your second paragraph should identify and describe the emerging spatial patterns for the core (USA). This paragraph should be about 100 words.
Your second third paragraph should identify and describe the spatial patterns for the semi-periphery (China). This paragraph should be about 100 words.
Your fourth paragraph should make spatial patterns for the periphery (Ghana). This paragraph should be about 100 words.
Your first paragraph should be a very, very brief introduction (no more than 2 sentences or about 50 words) and the fifth should be a very brief conclusion (no more than two sentences or about 50 words). These make up the 2 in the 3-2- paragraph essay.
By putting these five paragraphs together, you would have written an essay about emerging geographies of urbanization under globalization in the core, semi-periphery and periphery focusing on spatial patterns ONLY.
Rubic_Print_FormatCourse CodeClass CodeAssignment TitleTotal PointsHCA-807HCA-807-O500Contrast of Health Care Structures200.0CriteriaPercentageUnsatisfactory (0.00%)Less Than Satisfactory (73.00%)Satisfactory (82.00%)Good (91.00%)Excellent (100.00%)CommentsPoints EarnedContent70.0%Contrast of Public and Private Structures20.0%A contrast of public and private structures is either missing or not evident to the reader.A contrast of public and private structures is present, but incomplete or inaccurate.A contrast of public and private structures is presented, but is cursory and lacking in depth. The research used for support is outdated.A contrast of public and private structures is thoroughly presented and includes a discussion of all necessary elements. The contrast is moderately well supported though some sources of support are outdated.A contrast of public and private structures is thoroughly presented with rich detail and includes a discussion of all necessary elements. The contrast is well supported with current and/or seminal research.Analysis of Current Viability and Future Sustainability of Each Structure20.0%An analysis of current viability and future sustainability of each structure is either missing or not evident to the reader.An analysis of current viability and future sustainability of each structure is present, but incomplete or inaccurate.An analysis of current viability and future sustainability of each structure is present, but cursory. The research used for support is outdated.An analysis of current viability and future sustainability of each structure is present and thorough. The analysis is moderately well supported though some sources of support are outdated.An analysis of current viability and .
Based on the readings this week, answer the two following questions .docxcherishwinsland
Based on the readings this week, answer the two following questions in 150 words per question:
1. In this weeks' readings the Puerto Rican and Jamaican voice (specifically DJ Kool Herc losing his accent) were omitted from hip hop/rap culture while the Chicano voice was avidly expressed. In your opinion, what factors contributed to this binary of resistance and conformity? In other words, why do you think Chicanos held on to their language and slang, where other ethnic groups did not?
2. In hip hop/rap culture, how important is a name in the quest for identity formation? Use examples from the texts.
.
Based on the readings for the week, discuss your opinion on the need.docxcherishwinsland
Based on the readings for the week, discuss your opinion on the need for variance analysis in either a service provider setting (retail or restaurant), or manufacturing setting.
VanZante, N. (2007, April). Helping students see the "big picture" of variance analysis. Management Accounting Quarterly, 8(3), 39-40, 42-47. Retrieved March 17, 2010, from ProQuest Database.
.
Based on the reading assignment, your experience, and personal r.docxcherishwinsland
Based on the reading assignment, your experience, and personal research, please answer the following questions:
Thoroughly explain what is recovering, data, and validation as it relates to cell phone forensics?
What is evidence contamination as it relates to digital forensics?
List and describe at least two forms of contamination and how they can be avoided
What is the Faraday method?
List and explain three of the strategies associated with Faraday Methods
.
Based on the reading assignment (and in your own words), why are MNE.docxcherishwinsland
Based on the reading assignment (and in your own words), why are MNEs better able to exploit global opportunities (versus purely domestic competitors)?
Your response should be at least
200 words
in length. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
[removed] [removed] [removed] [removed]
Moffett, M. H., Stonehill, A. I., & Eiteman, D. K. (2012).
Fundamentals of multinational finance
. (IV ed., pp. 14-14). New York: Pearson.
In-text citation
(Moffett, Stonehill & Eiteman, 2012)
No Wiki, no dictionary.com, please cite all work.
.
Based on the primary documents from chapter 23 of AmericanYawp, plea.docxcherishwinsland
Based on the primary documents from chapter 23 of AmericanYawp, please answer the following questions in a thoughtful, well-written essay of approximately 750 words:
1: What is Herbert Hoover’s fear about the New Deal? What does he mean when he warns that a new deal “would destroy the very foundations of our American system”?2: What was Huey Long’s plan? Would Hoover have approved of it? Why or why not?3: What was FDR’s plan, as outlined in his re-nomination speech? Would Long and Hoover have approved or disapproved of this plan? Why or why not?
Papers should be double-spaced with normal fonts and margins and include an introduction and conclusion
.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
O R I G I N A L P A P E R‘‘It just crept in’’ The Digital.docx
1. O R I G I N A L P A P E R
‘‘It just crept in’’: The Digital Age and Implications for Social
Work Practice
Faye Mishna • Marion Bogo • Jennifer Root •
Jami-Leigh Sawyer • Mona Khoury-Kassabri
Published online: 11 February 2012
� Springer Science+Business Media, LLC 2012
Abstract Today’s generation of youth and adults relies
on communication technologies for entertainment, infor-
mation, and social connections and more and more, for
personal help and advice. With cyber technology having
permeated the ways in which individuals seek support for a
wide range of issues, the purpose of this paper is to report
on a study that examined practitioners’ experiences and
views of whether and how online communication has
entered their face-to-face practice and of the implication
for the therapeutic work. Using qualitative methodology,
2. 15 social work practitioners participated in focus groups
and interviews exploring their perspectives about the
impact of cyber technology on their traditional face-to-face
social work practice. The prevailing finding was that cyber
communication has dramatically changed the nature of
professional relationships. This key finding was supported
by four major inter-related themes arising from the data:
(1) client driven practice; (2) Pandora’s box; (3) ethical
grey zone; and (4) permeable boundaries. Implications for
practice are provided.
Keywords Cyber technology in therapy � Cyber
communication in traditional social work � Cyber
technology and ethics � Online technology and social work
practice
Introduction
Long before the rise of the Internet generation, Marshall
McLuhan (1964) asserted, ‘‘the medium is the message.’’
This prophetic and timeless statement is particularly rele-
vant in today’s society, in which online technology shapes
3. how individuals communicate. Communication technology
is growing exponentially with each successive generation
as a central fixture within our society and has radically
changed individuals’ social interactions, learning strate-
gies, and choice of entertainment. In response to this dra-
matic growth of electronic communication and information
sharing, practitioners have offered treatment through com-
munication technology since the 1990s (Huang and Alessi
1996; Murphy and Mitchell 1998; Smith and Reynolds
2002) and, more than ever, offer interventions online.
Several benefits have been identified including greater
flexibility and accessibility (Chester and Glass 2006;
Glasgeen and Campbell 2009).
Today’s generation of both youth and adults relies on
communication technologies for entertainment, informa-
tion, and social connections and more and more, for per-
sonal help and advice. Indeed, cyber technology has
permeated the ways through which individuals seek sup-
4. port for a wide range of issues. The purpose of this paper is
to report on a study that examined practitioners’ experi-
ences and views of whether and how online communica-
tion has entered their face-to-face practice and of the
implication for the therapeutic work.
The Internet, specifically social networking sites are
widely used by youth and adults alike. Approximately three
quarters (77%) of adults in the United States use the
Internet (Pew Internet & American Life Project 2009) and
similarly, about 72% of Canadians used the Internet in
2007 (Middleton et al. 2010). Ninety-eight percent of
F. Mishna (&) � M. Bogo � J. Root � J.-L. Sawyer
Factor-Inwentash Faculty of Social Work, 246 Bloor Street
West, Toronto, ON M5S 1V4, Canada
e-mail: [email protected]
M. Khoury-Kassabri
Paul Baerwald School of Social Work and Social Welfare,
The Hebrew University of Jerusalem, Mount Scopus,
91905 Jerusalem, Israel
5. 123
Clin Soc Work J (2012) 40:277–286
DOI 10.1007/s10615-012-0383-4
Canadian youth access the Internet and communication
technologies daily (Cassidy et al. 2009; Mishna et al.
2010), and 95% of American youth between 12 and
17 years go online, 80% of whom use social media sites
such as Facebook, Myspace and Twitter, often on a daily
basis (Lenhart et al. 2011). Three quarters of American
youth own a cell phone, and 88% text message (Lenhart
et al. 2010). The use of social networking sites in particular
is increasing throughout the US, Canada, and internation-
ally, and has become one of the most popular activities
among college students (Jones and Fox 2009; Rideout et al.
2010). Sites such as Facebook and MySpace report an
estimated 970 million and 41 million unique visitors
worldwide respectively (Google 2011a, b). Twitter has also
6. become a significant contributor to social networking with
an estimated 160 million unique visitors (Google 2011c).
Online interventions are typically offered on a one-to-
one basis through modalities such as email or instant
messaging (Barak et al. 2009). Online counseling requires
guidelines regarding matters such as the frequency of
giving feedback and the immediacy of responding (Barak
et al. 2009). Similar to traditional therapy, setting guide-
lines is imperative for maintaining a positive professional
relationship and avoiding abuse of the modality (Kraus
2004).
The rapid increase in the use of communication tech-
nologies presents unique complexities for social work
practitioners. In addition to providing a forum through
which practitioners can more easily distribute information,
network with others, and communicate with colleagues
(Lehavot et al. 2010), cyber communication allows clients
to access and communicate with practitioners with a
7. newfound ease, regardless of whether the practitioner
provides the client with their contact information. The use
of social networking sites and Search Engines such as
Google gives clients access to personal information about
the practitioner that they would not otherwise share
(Gabbard et al. 2011; Lehavot et al. 2010).
Unlike cyber counseling, for which guidelines and rules
are established and for which online communication is the
primary and perhaps only mode of therapy, instances now
arise whereby social work practitioners and clients interact
through cyber communication, although their primary
focus is face-to-face counseling. Such cyber communica-
tion can range from practical purposes such as rescheduling
appointments to intense therapeutic discussions for exam-
ple a client communicating online to the practitioner about
feeling suicidal. Although this cyber communication may
not be a planned component of the intervention, it never-
theless becomes part of the therapeutic exchange and is
8. therefore important to understand and address (Gabbard
et al. 2011). According to recent research findings, many
counselors struggle to sort out the meaning of email
communication with clients in their face-to-face counseling
(Bradley and Hendricks 2009). Bradley and Hendricks
(2009) differentiate email communication related to the
counseling from online communication that is chiefly
administrative or practical.
There is a growing body of research on online coun-
seling. While early research critiqued online therapeutic
practice as ‘‘the space between the two parties becomes
filled with hardware’’ (Robson and Robson 1998, p. 40)
recent studies have found a positive working alliance, with
online working alliance scores equivalent to those reported
for face-to-face counseling (Cook and Doyle 2002; Hanley
2009; King et al. 2006; Prado and Meyer 2004; Reese et al.
2002).
There has been a significant increase in the use of cyber
9. communication among a number of professions even when
cyber communication is not the primary mode of treatment,
thereby creating issues for practitioners (Bradley et al.
2011). There is a dearth of research however, on online
communication such as texting or email entering or
‘‘creeping’’ into traditional face-to-face social work clinical
practice, along with the implications of such permeation
for practice and policy. A survey of social workers was
conducted in the US (Finn 2006), about their views of
using email and issues that arose in using email with cli-
ents. Findings revealed that very few social workers (3.7%)
used email frequently in communicating with clients
whereas almost one third (31.7%) reported communicating
with clients at least once through email. Over half of the
participants believed that email communication should be
limited to practical and administrative use. Given the dra-
matic growth in the use of online communication (Bradley
et al. 2011) there is reason to believe that these numbers
10. have significantly increased.
Online communication has transformed and challenged
the ways service users and care providers connect and the
way service providers conduct their work with clients
(Midkiff and Joseph Wyatt 2008; Rafferty and Steyaert
2009; Whitaker et al. 2010). A study by Santhiveeran
(2009) evaluating compliance with the National Associa-
tion of Social Workers (NASW) Code of Ethics regarding
e-therapy websites revealed a lack of compliance with
respect to maintaining professional boundaries as a result
of the online communication. Indeed, in response to the
prevalence of communication technology within social
work practice NASW and the American Association of
Social Work Boards set guidelines regarding the use of
current and future technologies (NASW/ASWB 2005;
Rafferty and Steyaert 2009).
Although there is a growing body of research on online
therapy, there is little research that studies the phenomenon
11. of cyber technologies entering or ‘‘creeping’’ into tradi-
tional face-to-face social work practice. The research
278 Clin Soc Work J (2012) 40:277–286
123
studying email communication within treatment typically
examines such communication that occurs in therapeutic
practice in which the email interchange has been negotiated
as part of the process and for which there are guidelines.
For example, one study examined an Internet based self-
help program for clients with social phobia, in which the
therapist sent emails to supplement the cyber therapy
(Carlbring et al. 2006). Another study compared an email
based intervention to a manual based smoking cessation
program for college students, in order to examine the
effectiveness of counsellor emails as a smoking cessation
strategy (Abroms et al. 2009). Findings revealed that the
participants responded positively to counsellor emails as
12. they felt they benefited from the counsellor’s support and
encouragement through the email exchange.
With a somewhat different focus, Lehavot et al. (2010)
conducted a study to examine how the Internet intrudes
upon professional relationships between psychologists-in-
training and their clients. The focus was the counsellors’
use of the Internet, for example social networking sites, to
post personal information, which could be accessed by
clients. Findings revealed that 81% of the psychology
graduate students used a social networking site (e.g.,
Facebook). While most utilized security measures to limit
access to their personal information, a surprising number of
the students (21%) did not make use of security measures.
These findings highlight the new era in which communi-
cation technologies enable clients to have access to their
counsellors and information about their counsellors which
was not previously accessible.
The purpose of the current study was to better under-
13. stand cyber communications ‘‘creeping’’ into clinical
practice, by obtaining the perspectives of social work
practitioners whose primary mode of therapy is traditional
face-to-face counseling, in social service agencies or pri-
vate practice in a major Canadian metropolitan area. The
aims were to understand the nature and scope of online
communication between clinicians and clients, and to
explore the clinical, practical, ethical and legal issues that
arise. Findings will inform the development of professional
capacity and expertise related to cyber communication and
implications for face-to-face practice.
Method
This study employed an inductive qualitative design
(Merriam 2002) utilizing focus group data gathered in
2010, to identify social work practice and policy needs
related to the presence of technology in social work prac-
tice. The primary research questions guiding this study
were: (1) how do practitioners use technology to interact
14. with clients? and (2) what are the clinical, practical, ethical,
and legal issues associated with the use (or not) of cyber
communication in practice? To develop a conceptual
understanding of the research problem, this study utilized
inductive techniques consistent with the constant compar-
ison method (Strauss and Corbin 1998) in order to examine
the deeper, subjective meanings and experiences of par-
ticipants. Differing from deductive methods, inductive
approaches to research focus on modifying emerging
concepts and tracking the relationship between concepts
throughout the process of conducting research. Through
this process, and the analysis of group level data, uni-
versal statements can be drawn together representing
new knowledge about the research topic. A secondary
framework, emergent-systematic focus group design
(Onwuegbuzie et al. 2009), was adopted to: (1) comple-
ment theoretical sampling; (2) simultaneously collect and
analyze focus group data; and (3) assist with determining
15. data saturation. This framework allowed the researchers to
determine whether themes emerging in one focus group
also emerged in other groups. This resulted in examining
themes across groups, rather than individual focus group,
thereby producing richer group-level data. Ethics approval
was obtained from the University of Toronto Research
Ethics Board prior to data collection.
Sample
Fifteen social workers participated in the study. In addition
to providing signed informed consent, the participants were
required to meet the following inclusion criteria: (1) pos-
sess a Bachelor of Social Work or Master of Social Work
degree; (2) registration with the local regulatory body for
social workers; (3) current employment in a practice setting
that involves working directly with agency clients or in
private practice; and (4) reside in the local area.
Recruitment
Several approaches to purposive sampling included
16. agency-based sampling, targeted e-mail recruitment, and
snowball sampling (Patton 1990). Participants were
recruited through e-mail advertisements sent through the
professional association to the approximately 700 local
members, and to the school’s partner agencies, alumni
association, and faculty listserve. The e-mail advertise-
ments included an information sheet/consent form detailing
the study and advised interested individuals to contact a
member of the research team. Participants were not reim-
bursed monetarily for their participation. Individual inter-
views were held with two participants who could not attend
scheduled focus groups. Another 10 individuals volun-
teered but due to schedules and despite numerous efforts to
Clin Soc Work J (2012) 40:277–286 279
123
include them in a focus group or interview they were not
able to participate.
17. Participants
Of the 15 social workers who took part in the study, 13
were female and 2 were male and ranged in age from mid
30s to late 50s. All participants held MSW degrees, and
one had a PhD. All were practicing social workers, mostly
in social service agencies. A significant percentage had a
small part-time private practice and a very small minority
was solely in private practice. The participants represented
diverse fields of practice, including health, mental health,
education, and child and family service sectors. Years of
experience ranged from 5 to over 20 years, with more than
half of the participants (56%) reporting more than 20 years
of social work experience.
Data Collection and Analysis
Through individual in-depth interviews (n = 2) and focus
groups (3 groups; n = 13) a range of clinical, practical, ethi-
cal, and legal issues, arising as a result of cyber communica-
tion between social work practitioners and clients, was
18. explored. Participants were asked about: (1) their experiences
communicating with clients electronically; (2) how they
conceptualize cyber communication; (3) issues (clinical,
practical, legal, ethical) arising as a result of the cyber com-
munication with clients; (4) practitioners’ reactions and
responses to issues (clinical, practical, legal, ethical) identified
in the literature; and (5) needs regarding professional devel-
opment related to cyber communication. The co-principal
investigators facilitated the 1.5 to 2 hours focus groups and in-
depth interviews, which took place at the university.
Focus group and key informant interviews were digitally
recorded and data transcribed verbatim. MAXQDA 10.0, a
qualitative software program, was used to organize and sort
the data including memos and field notes collected by the
research team. In keeping with the constant comparison
method, line-by-line open coding was used during the
inductive phases of data analysis. In an effort to remain as
close to the data as possible, the co-principal investigators
19. and a trained doctoral student met monthly to refine initial
codes, clarify emerging themes, and discuss the findings.
Inductive analysis involved describing and linking patterns
within the data, based on initial codes, to identify emerging
themes. Consistent and contradictory themes were identi-
fied and compared across each focus group and the inter-
views. During the more deductive phases of data analysis,
consistent with focused and axial coding methods respec-
tively, major conceptual themes were identified. Selected
quotations from the interviews are used to illustrate key
thematic findings from the study.
Findings
The participants indicated that cyber communication with
their clients occurred approximately weekly and that cli-
ents were more likely to initiate e-mail contact (50% vs.
38%). The prevailing finding was that technology and
cyber communication has dramatically impacted traditional
social work practice in clinical, practical, ethical, and legal
20. ways. As one participant remarked, ‘‘it is kind of a given
that it’s [e-mailing] part of the world. It’s not realistic for a
practitioner, an agency, or anybody to say we’re not going
to do it [e-mail].’’ Communication via e-mail, text mes-
sage, and other forms of cyber-based communication
‘‘creeps’’ into traditional face-to-face social work practice.
The respondents all considered the utilization of cyber
communication for general administrative purposes as
practical, efficient and as good practice. The key finding
was supported by four major inter-related themes arising
from the data: (1) client driven practice; (2) Pandora’s box;
(3) ethical grey zone; and (4) permeable boundaries.
Client Driven Practice
Many respondents explained that their clients initiated
cyber communication more often, more purposefully, and
more persistently than the social workers. Practitioners
described scenarios in which this ‘‘creep’’ occurred, which
they related to factors such as client age, preference and
21. perceived advantages and challenges related to cyber
communication.
Client Age
Several respondents reported that especially for youth,
technology is the preferred means of communication and
naturally crept into their work: ‘‘They’re used to the fast
pace, immediate responses—texting!’’ One respondent who
did not use e-mail with clients stated, ‘‘I know my col-
leagues e-mail and text with clients in high school. In my
private practice, younger clients are much more assuming
that we’ll set something up by e-mail. It just has to do with
age.’’ Another explained that an adolescent client ‘‘had
never texted me before but he had my number and I had
his. He’s a kid right? He knows that it’s my cell phone so
he texted me. He had been struggling with depression and
then sent a text talking about wanting to kill himself.’’
Client Preference
Several respondents referred to the practice principle ‘‘start
22. where the client is at’’ as a reason to accept client-initiated
usage of technology. As one participant explained, ‘‘To
make life easier for your client, my belief honestly is we
280 Clin Soc Work J (2012) 40:277–286
123
need to go where our clients are and we have to go where
technology and communication is. I mean the world has
evolved. We have these wonderful modes of communica-
tion available and so for there to be new policies to really
grasp this and embrace this I think is important.’’ Another
respondent said, ‘‘I think most people choose e-mail
because it’s not quite as nerve-wracking. They don’t have
to speak to me right away so they seem to always choose
e-mail if they have e-mail.’’
Complements Traditional Face-to-Face Practice
According to a number of the participants, client-initiated
e-mail or text communication was a potential complement to
23. traditional face-to-face practice, especially for clients with
difficulty expressing themselves in person. As one practi-
tioner explained, ‘‘there was a student I would see in person
from our School Board who we had some of the most silent
appointments ever with a good 45 min of just me trying to
engage and him not. He would leave and then later that
evening, I would get a two or three-page e-mail about ‘these
are the things that I wanted to talk about.’ So I would keep
them and actually use them for the next face-to-face.’’
Referring to a youth and his father a participant stated,
‘‘where the teen has in-the-moment accessibility around the
texting, I see as a potential breakthrough moment that can
open doors. And the father being able to gradually express
himself in that slightly distant but also intimate way—the
kind of paradoxical thing that electronic communication
provides.’’ Another respondent said, ‘‘The whole act of
pressing ‘send’ for her is so relieving, to know that I’m
going to get this information and to know I now can fill in
24. the story she wasn’t able to tell me about.’’
Slippery Slope
Client initiated e-mails and texting emerged as creating a
dilemma for the respondents. When receiving what
appeared to be a practical and thus innocuous e-mail, the
respondents replied in kind, only to later often realize they
had unknowingly begun on a ‘‘slippery slope.’’ As one
respondent commented, ‘‘it might start with an e-mail to
change an appointment and then it can shift from that to
e-mails about issues to a crisis, with a client e-mailing a
practitioner saying they’re suicidal. The thing about the
slippery slope is that practitioners often don’t think about
that when it [cyber communication] starts.’’ E-mails can be
sent at any time of the day thereby extending the traditional
boundary imposed by organizations or practitioners. While
believing that replying to client-initiated cyber communi-
cation starts ‘‘innocently’’ practitioners soon recognized
that there are major practice and policy implications of
25. opening ‘Pandora’s box.’
Pandora’s Box
In contrast to using cyber communication for administra-
tive purposes, which was considered beneficial, incorpo-
rating cyber communication into social work assessment
and intervention was not necessarily seen as beneficial
according to the respondents. Once such communication
begins, it can be difficult to undo or limit. It emerged that
participants were concerned about opening a ‘Pandora’s
Box,’ comprising unexpected consequences of cyber
communication, and the potential for misinterpretation.
There could be positive, negative, or neutral unexpected
consequences of using cyber communication. Positive
unexpected outcomes included greater access for clients with
mobility or hearing challenges, increased connection for
isolated clients, and efficiencies such as quickly connecting
clients to supportive services. The challenging or negative
unexpected consequences related to issues of privacy and
26. confidentiality for both clients and social workers. Regard-
ing client privacy, one practitioner explained, ‘‘Some par-
ents, especially if they’re an English Language Learner,
don’t do the e-mail functions themselves. They rely on their
kids to do it. So the kids will log on for them and maybe read
the e-mail. I even had a kid who was responding to her mom’s
e-mail pretending she was her mother.’’
Another practitioner illustrated an unexpected negative
consequence related to wide dissemination of dissatisfac-
tion with services, reporting that ‘‘[a client] started a blog
about us and about how horrible we had treated him. This
is 4 years later and he still blogs about [the agency] reg-
ularly.’’ While previously, upset clients could also express
their dissatisfaction publicly (e.g., letters to the editor) it is
now dramatically easier to widely circulate such com-
plaints for example on a blogs, which then become per-
manent as they cannot be removed.
The respondents expressed a predominant concern about
27. clients misinterpreting their cyber communication, and
especially about the effect on the relationship. They were
concerned that due to factors such as the lack of non-verbal
cues clients might misinterpret a lack of timely response as
uncaring. One respondent explained, ‘‘I don’t have e-mail at
work so she was sending them to me during the day and I
couldn’t respond. Then she said ‘you’re not responding,
you’re not responding,’ that kind of thing.’’ Similarly,
another respondent said, ‘‘there was one time that I didn’t
respond right away [to e-mail]. She knows that I also get busy
and she knows the boundaries and all that but she had a very
difficult week because I hadn’t responded right away.’’
Ethical Grey Zone
Participants referred to the murky waters regarding the
ethical implications and possible dilemmas, created by
Clin Soc Work J (2012) 40:277–286 281
123
28. cyber communication in traditional social work practice. A
prime concern was not being able to ensure client (or
practitioner) privacy or confidentiality, along with the
associated liabilities. This finding stretched across domains
including client confidentiality, practitioner privacy/intru-
sion, liability, social networking and agency policy.
Maintaining client confidentiality and privacy was a
major concern in the respondents’ use of cyber communi-
cation. If ensuring or maintaining confidentiality was at all
uncertain, respondents reported feeling uneasy with this
method of communication, regardless of client preference
or perceived administrative or therapeutic benefit. One
respondent’s statement illustrated this concern: ‘‘It’s my
responsibility to protect the confidentiality and the thera-
peutic process but cyber space does not allow me to do
that.’’
Concern about practitioner privacy/intrusion emerged as
a significant theme. E-mail, text messaging, Skype, and
29. other forms of cyber communication were considered
major contributing factors to the growing perception of
social workers being available at any time of day. Findings
revealed that practitioners want to give clear messages
about their availability, office hours, role and responsibil-
ities, and want to maintain professional boundaries. The
respondents all voiced concern that cyber communication
can undermine these efforts. For example, one stated, ‘‘I let
kids know I won’t answer e-mails 24/7. I check e-mail a lot
but I don’t want to create the kind of open 24/7 because it’s
unrealistic and creates an expectation.’’
The respondents identified as a major theme the issue of
social worker liability due to cyber communication with
clients, referring to any infringement of confidentiality or
unethical practice. Without clear standards of practice
related to cyber communication, uncertainty about how to
best manage the cyber communication was palpable: ‘‘My
concern at this stage is the standards of the College in terms
30. of confidentiality, disclosure and the whole nine yards, not
only just protecting clients but protecting myself so I’m
careful with it [e-mail].’’
While the ethical implications of incorporating tech-
nology into their practice was consistently questioned in
terms of its impact on client confidentiality, the respon-
dents for the most part considered it important to grapple
with integrating these new forms of communication into
their practice. The use of blogs and social networking sites
however (e.g., Facebook, Twitter) was generally viewed
with more skepticism as a way to communicate with cli-
ents, even after termination. As one respondent stated, ‘‘I
had one young woman ask me to be a friend on Facebook.
I’m not on Facebook but I wondered. I mean we had fin-
ished but some months had gone by so was this her way of
wanting somehow to reconnect? Should I call her and
address it? What is it about when she says do you want to
be a friend on Facebook? I think these issues come up but
31. it’s not always clear how to respond to them.’’ Not all
participants thought contact with clients through social
networking sites should be controlled by standards of
practice or ethics guidelines. For example, one respondent
said, ‘‘There are already a lot of things regulated in terms
of therapy or counselling relationships. My concern is in
cases like Facebook or an e-mail account, my private life
intersects with my professional life. Facebook is a social
tool and a regulation in terms of how I decide to lead my
social life makes me really anxious.’’
Participants expressed the need for organizational poli-
cies and social work code of ethics regulating professional
behaviour in order to help them sort through the dilemmas
encountered related to cyber communication. At the same
time, respondents were doubtful this was fully possible. It
emerged that organizations vary a great deal regarding
policies related to cyber communication with clients. It
also emerged that workers made decisions about whether to
32. comply or circumvent agency policy in deciding how to
manage cyber communication. In some instances, practi-
tioners described clear agency policies either supporting or
discouraging the use of e-mail between social workers and
clients. Several participants in contrast, spoke about navi-
gating the use of e-mail in their practice without the benefit
of clear directives or policies. For example, a hospital
social worker indicated ‘‘the bioethics folks came out with
policies that you were only allowed to use client initials
and be careful of content but in fact it [e-mail] was used
much more freely. Once you start using e-mail, it’s kind of
easy to get in the habit, you know?’’ Another participant
described a ‘‘don’t ask, don’t tell’’ atmosphere related to
the use of e-mail: ‘‘they’re [the agency] telling us…’we’re
going to come up with a policy, we’re working on a pol-
icy’…it’s ‘don’t tell’ in a way.’’ Particularly important with
respect to the need for policy was how daunting it felt to
maintain records (e.g., tracking cyber communications, text
messages), without clear guidelines.
33. Since the relationship is central in social work practice,
the ethics grey zone inevitably intertwines with boundaries.
Permeable Boundaries
Permeable boundaries include behaviours that seemed to
stretch the usual boundaries. According to participants,
there are certain circumstances, behaviors, and requests
related to cyber communications that do not seem to
infringe on professional boundaries, but others that do. For
instance, as described by one respondent, ‘‘there is a kind
of chummy friendliness—so there’s a casualness—that’s a
bit different than in the session. It’s not that the sessions are
so formal but it feels different on e-mail. This person will
sign it, ‘we’ll speak soon’ or ‘how are you doing’? It’s a bit
282 Clin Soc Work J (2012) 40:277–286
123
friendlier so it’s in the direction of boundaries but it
changes or it introduces a new kind of dimension in terms
34. of how we relate.’’ Another respondent referred to the extra
time and space cyber communication can give clients fol-
lowing face-to-face sessions. This social worker believed
that e-mail let her client share feelings while extending the
session, albeit through a different means: ‘‘She wanted to
give me some feedback after the session, how she felt after
the session and kind of wanted to continue the session a
little bit [via e-mail].’’
According to the respondents, social workers are com-
fortable using e-mail in particular instances. For example,
sharing resources, scheduling appointments, or engaging in
other purely administrative purposes emerged as accept-
able uses of cyber communication and as not challenging
professional boundaries. Respondents were not comfort-
able or convinced however, of the benefit of engaging in
cyber communication in non-administrative ways particu-
larly due to the associated concerns such as boundary
issues. As one respondent stated, ‘‘it wasn’t part of a plan.
35. They just did it [e-mailed] spontaneously. When I got it, I
felt a little bit like a boundary had been crossed a bit for
me. I didn’t really welcome it.’’ E-mailing resources to
clients seemed to shift client expectations regarding cyber
communication in the therapeutic endeavour.
Managing a client’s infringement with a boundary,
especially when boundaries related to e-mail or texting
haven’t been clearly delineated, presented a considerable
challenge. Social workers are unsure how to re-establish
boundaries when they wish to pull back from the use of
cyber communication. One practitioner expressed dis-
comfort with the client e-mailing her material: ‘‘She’s now
literally this week started sending me these really abusive
letters that her husband’s been e-mailing her so she’s now
sending all this stuff to me. She’s asking me ‘tell me what
you think.’ My fear is, oh my gosh, what do I do?’’ Another
respondent voiced her ambivalence: ‘‘Re-scheduling was
getting quite complex and his comment was ‘e-mail it to
36. me,’ which I did because he sort of gave me consent but it
was really out of the ordinary and we hadn’t really done
that yet.’’
Cyber communication affects boundaries in practice
with couples and families. Generally, in systems oriented
practice social workers establish clear guidelines that
emphasize the importance of shared communication among
all members of the family and the social worker and the
importance of lack of secrets. Respondents discussed the
various ways they responded to one person’s individual
communication with the worker. Setting and finding
effective ways of maintaining the contract was illustrated
by a respondent who noted that even though she clearly
told the mother of a 17 year old daughter who was the
client that everything the mother sent by e-mail would be
shared with the daughter the mother persisted. When
receiving the e-mails at first the practitioner reiterated her
position, subsequently she only responded with ‘‘thank
37. you’’ and her contact information, and finally she did not
reply at all. Slowly, the mother stopped e-mailing her.
More complicated, in couple counseling a practitioner
described a husband who did not think his wife’s untidiness
was sufficiently addressed in the sessions. He ‘‘took pic-
tures of the house and he e-mailed that to me. The next
morning I go in and I told her that he had done this. I saw
that as if he wanted to share a secret with me but I had to let
her know. She was very, very uncomfortable with it. She
turned to him and she said, ‘you had no right to do that.’’’
Respondents gave examples in which information
obtained through cyber communication needed to be
shared because of the potential for harm. A respondent
described a father and teenage son dyad where text mes-
sages were used after the son gave permission. ‘‘It’s very
open, even though they don’t communicate that well
together, and they like me to be the bridge.’’ Alarmed late
on a Friday night by the son’s text, the practitioner
38. responded by text and still concerned, telephoned the cli-
ent. When it appeared the son was having suicidal thoughts
the practitioner said, ‘I need to talk to your dad.’ The dad
was sleeping already and I woke him up and, it started a
whole chain of events, but I don’t know what would have
happened had he not [sent a text] because I don’t think he
would have gone to his dad.’’
Discussion and Implications for Practice
This research represents one of the first studies to examine
the use and implications of cyber communication for tra-
ditional face-to-face social work practice. The over-
whelming finding was that technology and cyber
communication has not only ‘‘crept’’ into traditional social
work practice but indeed, signifies a turning point. Just as
cyber technology has shaped how people of all ages
communicate, it has revolutionized the communication of
practitioners and clients, even those engaged in traditional
face-to-face therapy. Core elements of the work have been
39. affected: boundaries (time and space); disclosure of infor-
mation (practitioners’ and clients’); therapeutic relation-
ship; ethical and legal issues and dilemmas; and policies
and procedures.
Cyber communication included e-mail, text messages,
and social networking sites. While the majority of
respondents reported typically using cyber communication
for practical purposes such as scheduling, many engaged in
cyber communication for matters relevant to the thera-
peutic work. Several respondents articulated a dilemma
with respect to the utilization of cyber communication in
Clin Soc Work J (2012) 40:277–286 283
123
their social work practice. On the one hand they recognized
the dominance of cyber communication and the need to
respect client preference to incorporate this way of com-
municating. Such recognition represents a central social
40. work tenet of respecting and starting where the client is
(Bogo 2006). The permeation into the practice of even
those practitioners who offer traditional face-to-face
treatment corresponds with the recent exponential growth
of cyber communication, radically altering social interac-
tions, learning strategies and choice of entertainment. In
particular, there is a rapid rise of social networking due to
the growing access and use of cyber communication tools
such as social media, text messages, e-mail, websites,
instant messaging, webcams and blogs (Hinduja and
Patchin 2009; Palfrey and Gasser 2008; Schrock and Boyd
2008). And, it is expected that the demand for and use of
cyber technology to access service will continue to increase
exponentially (Norcross et al. 2002; Rochlen et al. 2004;
Stamm 1998; Wright 2002).
An unanticipated effect was that in participating in the
focus group or interview, some respondents came to rec-
ognize just how much cyber technology had influenced
41. their practice. The research process itself thus offered
evidence that the utilization and influence of cyber com-
munication has become so common and entrenched that it
may go unnoticed.
The sheer quantity of information that is publicly
available demonstrates this dramatic shift in the landscape
of therapy. Stressing that information a client obtains on
the Internet is public and is thus his or her due, Gabbard
and colleagues conclude: ‘‘They cannot block certain
aspects of their lives from their patients, and they must
learn to adapt to the new world that cyberspace has cre-
ated’’ (p. 171–172). They contend that psychiatrists who
feel invaded because of such information being accessed
by a patient need to recognize and address their reactions as
countertransference for which supervision, consultation or
even therapy may be required.
There are some guidelines with respect to electronic
communication. The Health Insurance Portability and
42. Accountability Act (HIPAA), established in the United
States in 1996, ‘‘protects the privacy of individually iden-
tifiable health information’’ (HHS, n.d., ‘‘Health Informa-
tion Privacy,’’ para. 1; HHS 2003), including electronic
health information (HHS, n.d.). The Personal Health
Information Protection Act (PHIPA) first developed in
2004 and last amended in 2010, provides guidelines on
privacy and health information in Canada ‘‘in any medium,
whether in written, printed, photographic or electronic
form or otherwise’’ (Ontario 2010, Definitions section,
‘‘record’’). A primary purpose of this Act was to provide
protection for individuals’ privacy and confidentiality
(Ontario 2010). Nevertheless, the participants in the current
study made no reference to indicate knowledge of macro
policies and reported that within organizations, policies on
cyber communication are unclear, inconsistent, unrealistic,
or nonexistent, a finding that corresponds with literature
identifying a lack of guidelines on managing information
43. related to the Internet (Finn 2006; Gabbard et al. 2011).
Findings in the current study indicated that when
workers did not agree with an organization’s stance or if
there were no policies or guidelines, they made decisions
on a case-by-case basis which they did not necessarily
disclose to their supervisor or administration. Many of the
practitioners expressed the need for more direction and
policy development about this area. The lack of clarity and
disparity between organization policy and practitioner
behavior is not surprising, as practitioner and client cyber
communication is a relatively new occurrence.
Limitations
This study contains several limitations. Importantly, the
voluntary and self-selected nature of the respondents sug-
gests the need for caution in generalizing the findings to
social work practitioners. Participants with different
experiences may offer other insights and views. A related
limitation is that the sample largely comprised older,
44. experienced social work practitioners. As the younger
generation, those in 20s, have virtually grown up with
cyber communication as part of their world, their views
may have differed in important ways. In addition, this
study provides practitioners’ perceptions of their experi-
ences, which may differ (e.g., due to memory recall biases)
from their actual experiences. Despite these limitations, the
findings correspond with the literature and provide helpful
insight into the new phenomenon of cyber communication
between social work practitioners and clients.
Implications for Practice
The ascendancy of the new cyber world has significant
implications for practice. Cyber communication is practi-
cally universal among individuals of all ages and therefore
cannot be avoided. It is not feasible to adopt a policy which
prohibits cyber communication with clients. Regardless of
the practitioner’s preference or the organization’s policy,
clients can find and access practitioners—for example clients
45. might access their e-mail address, can find information about
them through search engines or contact them through social
networking sites. As Gabbard et al. (2011) explain, ‘‘Face-
book users may post photos and ‘tag’ or label another
Facebook user by name without the knowledge or consent of
the individual in the picture. Facebook users may discover
that they are tagged in a professionally unbecoming photo-
graph long after numerous others have seen it’’ (p. 169).
284 Clin Soc Work J (2012) 40:277–286
123
Practitioners and organizations must understand the
issues and implications and be prepared to respond
accordingly. Some age groups, particularly youth, are
highly dependent on communication technology. Children
and youth use technology such as the Internet more than
any other medium, with which to communicate (Kaynay
and Yelsma 2000). Indeed, young people’s use of the
46. Internet and other cyber communication is preferred over
watching television (Hinduja and Patchin 2009; Kowalski
et al. 2008).
There appears to be an over-arching category or theme,
which entails the changing nature of professionals’ rela-
tionships in the context of cyber communication. A sig-
nificant finding that emerged is that in permeating or
‘‘creeping’’ into social work practice, cyber communication
has extended the boundaries between social worker and
client. This extension is often client initiated, may occur
without the practitioner’s consent, is a slippery slope, and
may be beneficial or challenging, and has clinical, prac-
tical, ethical, and legal implications. Since a central legal
and ethical requirement consists of developing and main-
taining what are considered appropriate professional
boundaries, the impact of the cyber world on therapeutic
relationships must be acknowledge and addressed.
Until the advent of the cyber world, social work practice
47. was largely conducted in a fairly private manner, con-
trolled to a large degree by the social worker who deter-
mined what information would be communicated, how this
would occur, and with whom. The organization developed
policies for recording and sharing information with others
and the ways social workers and clients communicated
with each other was subject to prevailing ethical and
practice guidelines about consent, confidentiality, and pri-
vacy. In the case of couple and family work most social
workers communicated with all family members, avoided
secrets and alliances, and when there was reason to com-
municate across generation lines advised clients of this in
advance. Certainly the work between the client and prac-
titioner and within the agency was typically shielded from
public view. A striking finding of the current study is that
cyber communication has dislodged these firm expecta-
tions. As a result, clients, individually, and in couple and in
family relationships, reach out to practitioners through a
48. range of cyber communications and send various material
and information. Even agencies and organizations are
vulnerable. While most of the respondents did not report
having experienced negative consequences, some talked
about highly concerning communication from their clients,
for example the longstanding blog disparaging the work of
an agency. Since blogs do not have privacy settings or
features as do Social Networking Sites, they are particu-
larly easy to access and to distribute widely (Gabbard et al.
2011).
Individual practitioners and the social work profession
as a whole must accept that the choice to allow cyber
technology to infiltrate into traditional therapy is to some
degree out of the hands of practitioners or organizations.
The ubiquitous nature of cyber technology highlights the
inevitability that cyber communication will ‘‘creep’’ into
social work practice regardless of practitioner preference or
agency policy. The responsible position is to examine and
49. understand the consequences and implications in order to
inform practitioner behaviour.
References
Abroms, L., Gill, J., Windsor, R., & Simons-Morton, B. (2009).
A
process evaluation of email counseling for smoking cessation in
college students. Journal of Smoking Cessation, 4, 26–33.
Barak, A., Klein, B., & Proudfoot, J. G. (2009). Defining
internet-
supported therapeutic interventions. Annals of Behavioral Med-
icine, 38, 4–17.
Bogo, M. (2006). Social work practice: Concepts processes and
interviewing. New York, NY: Columbia University Press.
Bradley, L. J., & Hendricks, B. (2009). Email and ethical
issues. The
Family Journal: Counseling and Therapy for Couples and
Families, 17(3), 267–271.
Bradley, L. J., Hendricks, B., Lock, R., Whiting, P. P., & Parr,
G.
(2011). E-mail communication: Issues for mental health coun-
sellors. Journal of Mental Health Counselling, 33(11), 67–79.
Carlbring, P., Furmark, T., & Steczko, J. (2006). An open study
of
internet-based bibliography with minimal therapist contact via
50. email for social phobia. Clinical Psychologist, 10, 30–38.
Cassidy, W., Jackson, M., & Brown, K. (2009). Sticks and
stones can
break my bones, but how can pixels hurt me? Students’
experiences with cyber-bullying. School Psychology Interna-
tional, 30(4), 383–402.
Chester, A., & Glass, C. A. (2006). Online counseling: A
descriptive
analysis of therapy services on the Internet. British Journal of
Guidance and Counseling, 34, 145–160.
Cook, J., & Doyle, C. (2002). Working alliance in online
therapy as
compared to face-to-face therapy: Preliminary results. Cyber-
psychology and Behavior, 5, 95–105.
Facebook. (2009). Statistics. Retrieved from
http://www.facebook.
com/press/info.php?statistics
Finn, J. (2006). An exploratory study of email use by direct
service social
workers. Journal of Technology in Human Services, 24(4), 1–
20.
Gabbard, G. O., Kassaw, K. A., & Perez-Garcia, G. (2011).
Professional boundaries in the era of the internet. Academic
Psychiatry, 35(3), 168–174.
51. Glasgeen, K., & Campbell, M. (2009). The use of online
counselling
within an Australian secondary school setting: A practitioner’s
viewpoint. Counselling Psychology Review, 24(2), 42–51.
Google. (2011a, November 14). Site profile for Facebook. In
Doubleclick Ad Planner by Google. Retrieved from https://
www.google.com/adplanner/planning/site_profile#siteDetails?ui
d
=domain%253A%2520facebook.com&geo=001&lp=true.
Google. (2011b, November 14). Site profile for Myspace. In
Doubleclick Ad Planner by Google. Retrieved from
https://www.
google.com/adplanner/planning/site_profile#siteDetails?identifi
er
=myspace.com&geo=001&trait_type=1&lp=true.
Google. (2011c, November 14). Site profile for Twitter. In
Double-
click Ad Planner by Google. Retrieved from https://
Clin Soc Work J (2012) 40:277–286 285
123
http://www.facebook.com/press/info.php?statistics
http://www.facebook.com/press/info.php?statistics
53. http://www.hhs.gov/ocr/privacy/index.html.
Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the
schoolyard:
Preventing and responding to cyberbullying. Thousand Oaks,
CA: Sage Publications.
Huang, M. P., & Alessi, N. (1996). The internet and the future
of
psychiatry. American Journal of Psychiatry, 153, 861–869.
Jones, S., & Fox, S. (2009). Generations online in 2009.
Washington,
DC: Pew Internet and American Life Project. Retrieved
December 6, 2009, from http://www.pewinternet.org/w/media//
Files/Reports/2009/PIP_Generations_2009.pdf Data memo.
Kaynay, J. M., & Yelsma, P. (2000). Displacement effects of
online
media in the socio-technical contexts of households. Journal of
Broadcasting and Electronic Media, 4(2), 215–229.
King, R., Bambling, M., Reid, W., & Thomas, I. (2006).
Telephone
and online counseling for young people: A naturalistic compar-
ison of session outcome, session impact and therapeutic
alliance.
Counselling and Psychotherapy Research, 6(3), 175–181.
Kowalski, R., Limber, S., & Agatston, P. W. (2008). Cyber
54. bullying.
Malden MA: Blackwell Publishing.
Kraus, R. (2004). Ethical and legal considerations for providers
of
mental health services online. In R. Kraus, J. Zack, & G.
Stricker
(Eds.), Online counseling: A handbook for mental health
professionals (pp. 123–144). San Diego: Elsevier Academic.
Lehavot, K., Barnett, J. E., & Powers, D. (2010).
Psychotherapy,
professional relationships, and ethical considerations in the
MySpace generation. Professional Psychology: Research and
Practice, 41(2), 160–166.
Lenhart, A., Purcell, K., Smith, A., & Zickuhr, K. (2010).
Social
Media and young adults. Retrieved February 3, 2010 from
http://
www.pewinternet.org/Reports/2010/Social-Media-and-Young-
Adults.aspx.
Lenhart, A., Madden, M., Smith, A., Purcell, K., Zickuhr, K., &
Rainie, L. (2011). Teens, kindness and cruelty on social
network
sites: How American teens navigate the new world of ‘‘digital
citizenship.’’ Pew Internet & American Life Project.
55. McLuhan, M. (1964). Understanding media: The extensions of
man.
New York: McGraw-Hill.
Merriam, S. B. (2002). Qualitative research in practice:
Examples for
discussion and analysis. San Francisco, CA: Jossey-Bass.
Middleton, C., Veenhof, B., & Leith, J. (2010). Intensity of
Internet
use in Canada: Understanding different types of users (Business
Special Surveys and Technology Statistics Division Working
Papers 88F0006X, no. 2). Retrieved July 23, 2011, from http://
dsp-
psd.pwgsc.gc.ca/collections/collection_2010/statcan/88F000
6X/88f0006x2010002-eng.pdf.
Midkiff, D. M., & Joseph Wyatt, W. (2008). Ethical issues in
the
provision of online mental health services (Etherapy). Journal
of
Technology in Human Services, 26, 310–332.
Mishna, F., Cook, C., Gadalla, T., Daciuk, J., & Solomon, S.
(2010).
Cyber bullying behaviour among middle and high school
students. American Journal of Orthopsychiatry, 80(3), 362–374.
56. Murphy, L. J., & Mitchell, D. L. (1998). When writing helps to
heal:
E-mail as therapy. British Journal of Guidance and Counselling,
26, 21–32.
NASW/ASWB. (2005). NASW and ASWB standards for
technology
and social work practice. In NASW Press. Retrieved from http://
www.socialworkers.org/practice/standards/NASWTechnology
Standards.pdf.
Norcross, J. C., Hedges, M., & Prochaska, J. O. (2002). The
face of
2010: A delphi poll on the future of psychotherapy. Professional
Psychology: Research and Practice, 3, 316–322.
Ontario. (2010). Personal Health Information Protection Act,
2004. In
ServiceOntario e-Laws. Retrieved from http://www.e-laws.gov.
on.ca/html/statutes/english/elaws_statutes_04p03_e.htm.
Onwuegbuzie, A. J., Dickinson, W. B., Leech, N. L., & Zoran,
A. G.
(2009). A qualitative framework for collecting and analyzing
data
in focus group research. International Journal of Qualitative
Methods, 8(3), 1–21.
Palfrey, J., & Gasser, U. (2008). Born digital: Understanding
57. the first
generation of digital natives. New York: Basic Books.
Patton, M. Q. (1990). Qualitative evaluation and research
methods
(2nd ed.). Newbury Park, CA: Sage Publications, Inc.
Pew Internet & American Life Project. (2009). Demographics of
Internet users. Retrieved from http://www.pewinternet.org/
Static-Pages/Trend-Data/Whos-Online.aspx.
Prado, S., & Meyer, S. B. (2004). Evaluation of the working
alliance
of an asynchronous therapy via the internet. Sao Paulo:
University of Sao Paulo. Retrieved October 24, 2008, from
http://www.psico.net/arquivos/.
Rafferty, J., & Steyaert, J. (2009). Social work in the digital
age.
British Journal of Social Work, 39, 589–598.
Reese, R., Conoley, C., & Brossart, D. (2002). Effectiveness of
telephone counselling: A field based investigation. Journal of
Counseling Psychology, 49(2), 233–242.
Rideout, V. J., Foehr, U. G., & Roberts, D. F. (2010).
Generation M2:
Media in the lives of 8-18 year olds. Menlo Park, CA: Kaiser
Family Foundation. Retrieved June 5, 2010, from: http://
www.kff.org/entmedia/upload/8010.pdf.
Robson, D., & Robson, M. (1998). Intimacy and computer
commu-
58. nication. British Journal of Guidance and Counselling, 26(1),
33–42.
Rochlen, A., Zack, J., & Speyer, C. (2004). Online therapy:
Review of
relevant definitions, debates, and current empirical support.
Journal of Clinical Psychology, 60, 269–283.
Santhiveeran, J. (2009). Compliance of social work e-therapy
websites to the NASW Code of Ethics. Social Work in Health
Care, 48(1), 1–13.
Schrock, A., & Boyd, D. (2008). Online threats to youth:
Solicitation,
harassment, and problematic content: Literature review pre-
pared for the internet safety technical task force. Retrieved
March 25, 2009 from http://cyber.law.harvard.edu/sites/
cyber.law.harvard.edu/files/RAB_Lit_Review_121808_0.pdf.
Smith, S. D., & Reynolds, C. (2002). Cyber-psychotherapy.
Annals of
the American Psychotherapy Association, 5, 20–22.
Social Network Stats. (2008) Social networking site usage:
Visitors,
members, page views, and engagement by the numbers in 2008.
Retrieved from http://www.webstrategist.com/blog/2008/01/09/
socialnetwork-stats-facebook-myspace-reunion-jan-2008/.
Stamm, B. H. (1998). Clinical applications of telehealth in
mental
59. health care. Professional Psychology: Research and Practice,
29, 536–542.
Strauss, A., & Corbin, J. (1998). Basics of qualitative research:
Grounded theory, procedures and techniques. Newbury Park:
Sage Publications.
Whitaker, T., Torrico Meruvia, R., & Jones, A. (2010). Child
welfare
social workers’ attitudes toward mobile technology tools: Is
there a generation gap? Washington, DC: NASW.
Wright, J. (2002). Online counselling: Learning from writing
therapy.
British Journal of Guidance and Counselling, 30(3), 285–298.
286 Clin Soc Work J (2012) 40:277–286
123
https://www.google.com/adplanner/planning/site_profile#siteDe
tails?uid=domain%253A%2520twitter.com&geo=001&lp=true
https://www.google.com/adplanner/planning/site_profile#siteDe
tails?uid=domain%253A%2520twitter.com&geo=001&lp=true
http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/p
rivacysummary.pdf
http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/p
rivacysummary.pdf
http://www.hhs.gov/ocr/privacy/index.html
http://www.pewinternet.org/w/media//Files/Reports/2009/PIP_G
enerations_2009.pdf
http://www.pewinternet.org/w/media//Files/Reports/2009/PIP_G
enerations_2009.pdf
http://www.pewinternet.org/Reports/2010/Social-Media-and-
Young-Adults.aspx
61. http://www.webstrategist.com/blog/2008/01/09/socialnetwork-
stats-facebook-myspace-reunion-jan-2008/
http://www.webstrategist.com/blog/2008/01/09/socialnetwork-
stats-facebook-myspace-reunion-jan-2008/
Copyright of Clinical Social Work Journal is the property of
Springer Science & Business Media B.V. and its
content may not be copied or emailed to multiple sites or posted
to a listserv without the copyright holder's
express written permission. However, users may print,
download, or email articles for individual use.
Catherine Stone, LCSW
Clinical Director
Branford Counseling Center
1. Focus on the social worker’s educational background and
training.
I went to undergraduate school and received a BA is
Sociology/Anthropology. I then went to graduate school about
8 years after receiving my BA. I received a Master’s degree in
social work with a specialty in clinical work. I have specialized
training and certification in Dialectical Behavioral Therapy,
Trauma Focused CBT, and Sand Tray Therapy. I have a
certificate in supervision and management.
2. Determine whether the social worker is licensed, and find
out about what brought him or her to the field as well as his or
her work history.
I am a licensed clinical social worker and have the title of
LCSW. In college, I was interested in other cultures and
customs. In my junior year, I studied abroad in Thailand where
I learned the language, lived with a Thai family, and then spent
62. a month in a remote hill tribe village. I loved learning about
the differences and similarities among people and cultures.
After college, I worked at Harvard University doing
administrative work at the East Asian Language Department. I
went on to work at a holistic health center and became licensed
as a massage therapist and energy worker. I loved doing body
work, but wanted to also work with people at the level of
thoughts and feelings. I wanted to better understand how one’s
environment impacted beliefs and overall sense of wellbeing. I
decided to explore social work and went on to receive my
Master’s degree. I completed two internships; one at a
specialized school for children with learning disabilities and
behavioral issues, and the other at a VA Hospital. The VA
placement was very challenging, as I worked on an amputee unit
with mostly WWII veterans who were not so keen on opening up
to a then young female intern. I also helped on the Hospice
unit, which was also very challenging.
My first job out of social work was at a residential treatment
center for adolescent girls in Baltimore. I learned so much in
my 2.5 years there, but the learning curve was steep and there
were so many extraordinary stories of tragedy and triumph. I
went on to work at a community mental health center were a
broadened my scope of practice to include adults. I also worked
for DCF for 2.5 years working at a children’s hospital for
children with mental illness. Currently, I am the clinical
director of an outpatient treatment center. I do about 85%
administration and about 15% direct care. I like the
administrative part of my work, and the supervision of other
clinicians and interns.
3. Inquire about the social worker’s job activities,
professional roles, and target client group, as well as services
provided by his or her organization.
Branford Counseling Center is a community mental health
center that has been providing outpatient mental health
treatment for over 40 years. We have a number of licensed
clinicians and psychiatrists. We provide individual, couples,
63. and group therapy to Branford residents from the age of 4 years
old and up. Our psychiatrists complete evaluations and provide
medication management to children, adolescents, and adults. In
terms of my job, I am the clinical director and assistant director
of our agency. I provide supervision to the majority of clinical
staff. I meet with my supervisees weekly to review cases,
discuss treatment interventions, provide support, and address
administrative issues as they arise. We have also just
implemented an electronic medical record and I have played a
large role in providing training in the new system. I assist the
Executive Director in planning, organizing, and initiating
comprehensive counseling and social service programs. This
includes developing and implementing mental health services in
the community of Branford.
4. Determine the social worker’s professional work
preferences (e.g., group, individual).
I like to work with clients individually. I especially like
working with folks with anxiety and trauma.
5. Ask about professional development and the social
worker’s strategies for self-care.
As part of my licensing requirements, I must complete 15
continuing education credits yearly. So, I am frequently
attending trainings and seminars. My profession requires that I
continue to learn and grow as a therapist. In terms of self-care,
I take advantage of my vacation time and try hard to not work
over my 40 hour a week schedule. I have clear professional
boundaries, which I believe benefits my clients and me. I take
recreational classes and seek out my own therapy when and if
needed.