This document discusses Web 2.0 technologies like social networks, blogs, and media sharing sites and some of the associated digital dangers around inappropriate contact, content, and conduct. It notes common reasons people are drawn to social media while also addressing issues like online privacy, managing one's digital footprint and online reputation, and how to safely use social networks. Tips are provided around protecting one's reputation, acting quickly if issues arise, and assuming information shared online is permanent.
Your professional reputation online matters. This presentation explains who is using the internet and social media in the United States, opportunities for lawyers to connect online, the harm that may result from not claiming your firm's social media profile and what to do when faced with negative criticism.
This talk outlines ways to make yourself known effectively on the Internet and create the image you want rather than the one that is built by your friends or your travels.
Your professional reputation online matters. This presentation explains who is using the internet and social media in the United States, opportunities for lawyers to connect online, the harm that may result from not claiming your firm's social media profile and what to do when faced with negative criticism.
This talk outlines ways to make yourself known effectively on the Internet and create the image you want rather than the one that is built by your friends or your travels.
Bridging the digital divide: How schools can prepare students to be good digi...williamslibrary
Abstract
As technology moves at a rapid pace it is important to review how students from low socio economic areas are catered for. Schools in these areas face many challenges; how they address these issues impacts on the students’ participation and skills as digital and global citizens. The government is implementing policies and funding to reduce the digital divide, but is it enough to prepare students from low socio economic areas to function effectively as digital citizens.
Presentation delivered to High Schools to explain how Social Sites can effect our reputation and maybe influential on college, university or employment selections process.
Bridging the digital divide: How schools can prepare students to be good digi...williamslibrary
Abstract
As technology moves at a rapid pace it is important to review how students from low socio economic areas are catered for. Schools in these areas face many challenges; how they address these issues impacts on the students’ participation and skills as digital and global citizens. The government is implementing policies and funding to reduce the digital divide, but is it enough to prepare students from low socio economic areas to function effectively as digital citizens.
Presentation delivered to High Schools to explain how Social Sites can effect our reputation and maybe influential on college, university or employment selections process.
This presentation gives an overview on the Web 2.0 buzz, shows a number of examples and asks questions about privacy and legal aspects. Finally, we make suggestions how to implement a social web project and reminds to meet locally as well.
Presented at CPA Congress Vic, 11 Oct 2010.
Topics:
Trust and openness, the new paradigm for engagement
The importance of people and personality
Evaluating the benefits, risks and challenges
Existing channels and new strategies
Practical examples of social media
A Corporate Approach To Social Media - by Jos Schuurmans / CluetailJos Schuurmans
Jos Schuurmans looks at "social" or "participatory" media, the "social web" and "New Internet" from a corporate organizational viewpoint.
He lays out a conceptual framework for understanding where we are at this point, as well as a general approach to social media through "change from the inside out".
This is the slightly expanded version of a session I recently did in Elluminate via LearnCentral with the students in our course, BeyondWebCT: Integrating Social Networking Tools Into Language & Culture Courses. Kevin Gaugler of Marist College was our guest speaker.
This was the focus of the session:
How can educators filter and manage the abundant resources and information now available through the internet? In the spirit of collaboration and community building, many educators are turning to these mediated environments to learn with and from each other. In this session we'll explore some tools that can help us manage content of interest to us and that can provide our students and us the option of learning with and from those outside the traditional course environment.
El objetivo de esta conferencia, impartida en la Facultat de Ciències de la Comunicació de la Universitat Autònoma de Barcelona el 25.10.2017 en el marco de la Open Access Week, es demostrar los beneficios derivados de la utilización de recursos basados en el web 2.0, como por ejemplo los blogs y las redes sociales como Twitter o Researchgate, para incrementar la difusión, la visibilidad y el impacto de la producción científica de los investigadores, así como para mejorar su reputación digital.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
14. Online Reputation
50%
45% Americans Not
40% Concerned
35%
30%
25% College
20% Admission/Hu
15% man Resources
Always
10%
5% College
0% Admission/Hu
man Resources
Perception of Online Most of Time
Reputation
22. Safely Use Social Networks
1. Use caution with links
2. Don’t trust sender of message
3. Do not allow to scan address books
4. Type or bookmark address
23. Safely Use Social Networks
5. Be selective about friends
6. Choose carefully
7. Assume everything is permanent
8. Think twice before access at work
25. Something to Think About
http://www.youtube.com/watch?feature=player_embedded&v=aDy
cZH0CA4I#!
26. Works Cited
11 Tips for Social Networking Safety. Microsoft. n.d. Web. 19 Mar. 2012.
<http://www.microsoft.com/security/online-privacy/social-networking.aspx>.
Careless, James. “Social Media: It Does Have a Place in the Classroom. “ Tech & Learning.
32.7. (Feb. 2012). 43-46. Print.
Carrick, Damien. “Social Media and Privacy.” Law Report: Separate Stories Podcast. ABC
Radio National. 28 Feb. 2012. MP3 file. 15 Mar 2012.
Cross-Tab Marketing Services. “Data Privacy Day: Perceptions Study.” Trustworthy
Computing Group, Miscrosoft. Jan 2010. Microsoft PowerPoint File. 15 Mar 2012.
<http://www.microsoft.com/security/resources/research.aspx#social>.
“Digital footprint.” Webopedia. ITBusinessEdge, QuinStreet, Inc. Web. 15 Mar. 2012.
<http://www.webopedia.com/TERM/D/digital_footprint.html>.
Englishnationalopera. “Can I Be Your Friend.” YouTube. 8 Jun. 2011. Web. 24 Mar. 2012.
<http://www.youtube.com/watch?feature=player_embedded&v=aDycZH0CA4I#!>.
Frugal Dad. Wrestling Online Privacy. 2011. Infographic. The Under Cover Recruiter. Web. 19 Mar 2012.
<http://theundercoverrecruiter.com/content/infographic-how-social-media-online-privacy-risk-you>.
Gallagher, Frank. “Hand in Hand: Media Literacy and Internet Safety.” Library Media
Connection. 29.4 (Jan./Feb. 2011): 16-18. Print.
27. Works Cited
Kgiannas1389. “Racist Teens Ousted.” YouTube. 16 Feb 2012. Web. 14 Mar. 2012.
<http://www.youtube.com/watch?v=bEkyP4A_4sQ&feature=related>.
McMillian, David. “How to Ruin Your Life in 14 Minutes: or Why We Need to Have a Serious
Disucssion About Social Media Ethics” ThoughtCatalog. ThoughtCatalog. 23 Feb 2012. Web. 14 Mar
2012. <http://thoughtcatalog.com/2012/how-to-ruin-your-life-in-14-minutes-or-why-we-need-a-
serious-conversation-about-the-ethics-of-social-media/>.
Popkin, Helen A.S. “7 Signs We’re Living in the Post Privacy Era.” Posted in Technolog. MSNBC.
Com Tech. n.d. Web. 14 Mar 2012.
<http://www.technolog.msnbc.msn.com/technology/technolog/7-signs-were-living-post-privacy-
era-118087>.
Roesler, Kelly. “Privacy Issues with Web 2.0.” Social Issues Firsthand: Web 2.0. Ed. Laurie Willis.
Farmington Hills: Greenhaven Press, 2009. 47-53. Print.
Socialmediaboost. “Social Media Revolution 2012 (Socialnomics 3).” YouTube. 11 Jan. 2012. Web. 6
Mar. 2012. <http://www.youtube.com/watch?v=ZQzsQkMFgHE&feature=related>.
Take Charge of Your Online Reputation. Microsoft. n.d. PDF. 24 Mar. 2012.
<http://www.microsoft.com/security/online-privacy/social-networking.aspx>.
Ventura, Paul M. “What is Web 2.0 and What Are Some Web 2.0 Examples?” EzineArticles.com.
EzineArticles. 3 Oct 2011. Web. 13 Mar 2012. <http://ezinearticles.com/?What-Is-Web-2.0-and-
What-Are-Some-Web-2.0-Examples?&id=6602854>.
“Web 2.0." Collins English Dictionary - Complete & Unabridged 10th Edition. HarperCollins Publishers.
13 Mar. 2012.<http://dictionary.reference.com/browse/web 2.0>.
28. Images
Andreyutzu. Time. 2008. Photograph. Stock.xchang, Getty Images. Web 31 Mar. 2012.
<http://www.sxc.hu/browse.phtml?f=download&id=950851>.
Axonite. Hardware Circuits 4. 2009. Photograph. stock.xchang, Getty Images. Web. 6 Mar 2012.
<http://www.sxc.hu/browse.phtml?f=download&id=1218115>.
ColinBroug. Footsteps 2. 2010. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012.
<http://www.sxc.hu/browse.phtml?f=download&id=1269420>.
Da Silva, Frank. My Cyber Social Map. NA. Photograph. fotopedia, flickr. Web. 6 Mar 2012.
<http://images.cdn.fotopedia.com/flickr-2386230724-original.jpg>.
Daxmac. Danger sign. 2012. Photograph. stock.xchang, Getty Images. Web. 13 Mar. 2012.
<http://www.sxc.hu/browse.phtml?f=download&id=1381198>.
GretheB. Cobweb 2. 2011. Photograph. stock.exchang, Getty Images. Web. 6 Mar 2012.
<http://www.sxc.hu/browse.phtml?f=download&id=1353782>.
Igoghost. Doodled Desks 2. 2009. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012.
<http://www.sxc.hu/browse.phtml?f=download&id=1193228>/
Ischerer. Televosion Tower. 2008. Photograph. Stock.xchang, Getty Images. Web. 13 Mar. 2012.
<http://www.sxc.hu/browse.phtml?f=download&id=1020178>.
KateKrav. Door Locker with Chain. 2012. Photograph. Stock.xchang, Getty Images. Web 31 Mar.
2012. <http://www.sxc.hu/browse.phtml?f=download&id=1383270>.
Pascal79. Do Not Disturb. 2007. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012.
<http://www.sxc.hu/browse.phtml?f=download&id=839252>.
“The web” in today’s society (Ba Silva). In the words of Becky Hogge: “The web is developing from a place where we read stuff, through a place we interact with, into a place we personalize” (Web 2.0 57).
According to Dictionary.com Web 2.0 is “the internet viewed as a medium in which the interactive experience in the form of blogs, wikis, forms, etc., plays a more important role than simply accessing information.” Image: (Axonite)
Now that I have shared the definition of Web 2.0, this might be a good time to provide some examples. Web 2.0 covers a lot of ground and many different areas such as Social Networks (Facebook and Twitter), Blogs (Blogger and Word Press), Video, Image and Media Sharing sites (YouTube, Flickr), Wikipedia, Article Directories, and RSS feeds. These examples all make for a very interconnected world (Ventura)
Social media is a huge part of the Web 2.0 world. (Show Video) With the statistics illustrated in the video we cannot ignore the impact of social media and web 2.0. But with all these opportunities comes the question, how do we stay safe? How do we keep our personal information private in an increasingly interconnected world?
Why do we use Web 2.0 and social networking? For some it’s just an online popularity contest to see who can gather the most friends or followers. Other’s are trying to promote themselves and advertise their skills. It is also a new way of interacting with the world as a whole. Web 2.0 users can share through blogs, flickr, mashups, playing online games, and just the mundane aspects of their everyday life. It can also be used to rediscover people from their past. Perhaps find a friend you haven’t talked to in many years (Roesler 47-53 Web 2.0)
Much of the early teachings on internet safety focused on keeping kids safe from predators. This is not as much of a danger as originally believed. The Federal Trade Commission has outlined three categories of danger: Inappropriate contact, inappropriate content and inappropriate conduct. “Inappropriate contact is communicating with anyone whose aim is to harm” (Gallagher 16). This can include: Predators, hate groups, groups that promote dangers behaviors (i.e. anexoria). Inappropriate content includes pornography, dangerous/illegal behaviors, and making private personal information public. “Inappropriate conduct includes sexting, cyberbullying, plagiarism, hacking, spreading false or malicious information . . .” (Gallagher 16). Image: (Daxmac)
The growing trends in technology are giving way to a lessoning of privacy all around us. Don’t just give away the small shred of privacy we have left. Some of the examples of the lessening of our privacy include the FTC only giving Facebook the equivalent to a stern “no” and no actual punishment for changing their privacy controls in 2009 and making it more difficult to hide your personal information. Now they must inform members before the way their information is shared will be changed. This comes at an interesting time with the new Facebook Timeline that essentially asks for more information and wants to lay out your life in the pre-Facebook world. In addition there is the issue with cellphones being able to track your location by GPS and corporations saving this information, some companies also used a program which saved keystrokes, this means they were also logging what you were doing online including passwords. Along with the cellphones comes the issue of whether police can search them without a warrant or use cellphone signals to track your location. With some of these issues beyond our control unless we choose never to use Facebook or cellphones it is essential we protect the privacy we can (Popkin) Image: (Pascal79).
One American study of college students showed 40% of the students had no understanding of their privacy. When asked 5 questions the 40% of students were unable to answer a single question correctly. They believed there were more rights protecting them than there actually are (Carrick). Image: (Iigighost)
Web 2.0 has created a generation of people who are used to the ability to share ideas, images and videos whenever and where ever they wish to. This has increased the size of potential audiences and speed we can share information. These tools can be used for good, for example the ability to speak out about questionable business practices to supporting our charitable causes. In addition these tools can be used for bad, the information we share has the potential to ruin our lives along with the lives of others. Our mistakes used to be memorialized in our friends memories and those can be faulty. Today a mistake can be saved online for years. The mistakes made in high school could potentially affect your life for years to come because it’s out there online where anyone can find (McMillian). Image: (Ischerer).
It is imperative students realize there are consequences to their actions. Anything posted online can go worldwide in matter of minutes. Take the case of two teens from Gainesville, Florida who posted a 14 minute racist rant in February 2012 that quickly went viral and completely changed their lives forever. The teens began receiving death threats and had to leave their school as part of the backlash from this video posted on YouTube. It is yet to be seen how this video will affect their lives from here on out (McMillian)
A common term when discussing social media is “digital footprint.” According to Webopedia a digital footprint “is the word used to describe the grail, traces, or “footprints” that people leave online.” We need to teach children to look closely at their digital footprints. Once information has been posted in a digital format it persists somewhere over time. This is referred to as the “digital eternity” (Carrick) Not only do people need to watch what they post, they need to be aware that whatever others post about them on social media websites will also follow them forever (Frugal Dad). In 2006 a single mother had posted a picture of herself dressed as a pirate with the caption “Drunken Pirate.” Later on she was taking part in a program to get her teaching degree and was not allowed to graduate on the basis of this photo. When this single mom protested she lost the fight and was unable to graduate (Carrick). This is just one reason to watch what is put online. Image: (ColinBroug)
The Perceptions study from January 2010 showed that 37% of Americans are not concerned at all about the impact their online reputation may have on the ability to get a job or be admitted into college. This same study showed that 44% of college admissions personnel and human resource departments always review the online reputation of a prospective student/employee and 35% review this information most of the time (Cross-Tab).
This same survey found that 70% of recruiters have rejected an applicant based on information found about the applicants online reputation while only 7% of Americans believe this information can affect a job search. On a positive note 86% of the recruiters admit that a good online reputation can have an affect on a potential employees job application (Cross-Tab).
We’ve seen what mistakes using social media and Web 2.0 can do to people and the impact social media can have on employment opportunities. How do we prevent this from happening to us or those we care about?
In a posting by David McMillan on the Thought Catalog he shares the 5 key points which should be addressed in social media ethics. Point 1, “In social media, there is no difference between public and private.” it is important to remember anything posted online can be seen by the world at large potentially. This includes current and future employers, friends, and even parents. If you are not comfortable with these people all knowing something, it’s probably best not to share online. Point 2, “Just because you can post something doesn’t mean you should.” Be sure to avoid the temptation to post something just because you thought of it, make sure it’s not something you’ll regret after coming back to reality. The speed which things can be shared can often short circuit people’s thinking skills much like being inebriated. Point 3, “Your online and offline selves might not be identical, but they’re joined at the hip.” When posting anything online either publicly or privately first consider the impact on your offline life. Once things are posted online you no longer control the information and anyone has the potential to find it. Point 4, “Will what I post cause harm to others?” Stop and consider before posting judgmental comments online if you would be willing to say that to someone’s face and have your mom know about it first hand. Point 5, “Finally, call it the Social Media Golden Rule: post about others as you know have them post about you.” This doesn’t mean lie about people, just be prepared for the backlash if you post something others may not like. They will not hesitate to make their thoughts about you clear either.
Not only should a Web 2.0 user consider those points by McMillian, they should consider this, what will happen to their digital life when they die? All of that information which has been shared online could come back and haunt your loved ones. Is there anything out there you’d rather not share?
One important step in managing your digital footprint is simply searching your name online. Try several search engines to see what comes up, don’t forget to search images along with text. Make sure to try different variations of your name. Then check the information that comes up, is it you and is the information accurate? Also consider if you need multiple online profiles, such as one for personal life and one for your professional life. Keep in mind anything on the internet is searchable and permanent (Take Charge). Image: (ColinBroug).
It’s key to think before you post information. How will it reflect upon you? Do not hesitate to talk with friends and family about the type of information you are willing to share and not willing to share. If necessary ask them to remove items and information you don’t wish to have shared. Keeping this in mind don’t forget the “Golden Rule” when posting online and treat others as you would like to be treated. In other words don’t post information about others you would not be willing to have posted about yourself. Once your online reputation is established stay vigilant and keep running searches on yourself. It’s also a good idea to set up something like a Google Alert on yourself to keep up with when your name is posted online. Finally, check who has access to your online information, it’s okay to remove people (Take Charge). Image: (KateKrav).
If you find incorrect or inappropriate information about yourself online it’s important to act quickly. The sooner the information is removed the better. The first step is to ask the person who posted it to either remove or correct any errors. If this does not work ask the site administrator for help (Take Charge). Image: (Andreyutzu).
Some tips for using social networking include: 1.) Treat any links friends send through social networking sites with caution like you would a link sent through e-mail, 2.) Just because you think a message came from a friend, that does not mean it did, so if a message looks suspicious use a different method to contact your friend, 3.) When joining a social network it will often offer to scan your address book to find out if your contacts are on the network, using this information sites can then send e-mails to anyone you’ve ever e-mailed, 4.) Always type the web address of the social networking site or go to it through your bookmarks, don’t follow links in an e-mail, these links could take you to a fake site (11 Tips).
5.) Don’t just accept anyone as a “friend” on social networking sites, confirm their identity because it could be fake, 6.) Check out the social networking site you plan to use carefully, read the privacy policy and make sure you treat this decision with the same care as selecting a site you would give your credit card number, 7.) Everything posted online is permanent, even if you delete your profile anyone could have saved the information and 8.) Don’t access social networking sites at work or at a public computer (11 Tips).
With all of the issues addressed is there a place for Web 2.0 and Social Media in education? Some will compare the emergence social media to the emergence of rock’n roll and blame it for corrupting the youth of America. Yes there must be a place, if we ignore the current direction society is going we will do a disservice to our students. The use of social media plays an integral part of society today. We must teach students the proper use. When students are allowed to share their work online and strangers take the time to comment it shows the student they can have an impact and people really do care. In addition building an collection of material online can help with the college application process, this helps students build a digital resume which can help sway college admissions officials. It must be recognized that social media and web 2.0 represent a new way of doing things, not just in education but in society as a whole (Careless).
Just something to think about after today’s presentation. (Show Video) Would you act like that in real life? If no, why do we feel it is okay online?