Retweet, not reteach!


Published on

Presentation to the Region 10 Library Summit on August 17, 2012. I attempt to persuade and empower school librarians to teach students how to glean good information and discard the bad in the fast-moving environment of Twitter.

Published in: Education, Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Retweet, not reteach!

  1. 1. How librarians can teach and advocate use ofSocial Media to promote Digital Citizenship and Information Literacy
  2. 2.  Persuade participants that all librarians must play a role in teaching about Social Media as an information source Give concrete lesson ideas that tie the duties and responsibilities of librarians to teaching social media Provide some thought provoking conclusions and questions that will result in innovative practices this year and beyond
  3. 3.  As of 2011, 80% of all US teens used social media  For each year prior, this percentage increased between 5 and 8 percent  This means approximately 90% are now connected to Facebook, Twitter or bothData from “Teens, Kindness and Cruelty on Social Media Sites.” Pew Internetand American Life. 2012
  4. 4. Not much, unless you consider: Value systems and world views Sexual politics and relationship advice Trying out new identities Gossip, rumor and trendy humor
  5. 5.  Social rewards-65% say social networking makes them feel better about themselves Sense that they would miss out on something if they are not connected
  6. 6.  Over 50% ban it completely Most emphasize prevention of negative online behaviors ◦ Sexting ◦ Cyberbullying ◦ Privacy concerns ◦ Inappropriate communication between teachers and students While these are valid concerns, the negative approach serves to increase students‟ feeling of disconnect between school and real life.
  7. 7. From easy to more challenging:1. Teach use of Twitter as information source and how to cite a Tweet2. Teach determining reliability of information3. Teach more advanced skills such as analyzing a Twitter feed on a topic and drawing conclusions4. Teach about online participation, Digital Citizenship and „Infotention” skills
  8. 8. Begin the entry in the works-cited list with theauthor‟s real name and, in parentheses, user name,if both are known and they differ. If only the username is known, give it alone.Next provide the entire text of the tweet inquotation marks, without changing thecapitalization. Conclude the entry with the date andtime of the message and the medium of publication(Tweet). For example:Athar, Sohaib (ReallyVirtual). “Helicopter hoveringabove Abbottabad at 1AM (is a rare event).” 1 May2011, 3:58 p.m. Tweet.
  9. 9. The date and time of a message on Twitter reflect the reader‟s timezone. Readers in different time zones see different times and,possibly, dates on the same tweet. The date and time that were ineffect for the writer of the tweet when it was transmitted arenormally not known. Thus, the date and time displayedon Twitter are only approximate guides to the timing of a tweet.However, they allow a researcher to precisely compare the timing oftweets as long as the tweets are all read in a single time zone.In the main text of the paper, a tweet is cited in its entirety (6.4.1):Sohaib Athar noted that the presence of a helicopter at that hourwas “a rare event.”Source:
  10. 10. Keller, Jared (jaredbkeller). “Eitherthere‟s more plagiarism than ever, or theinternet is making it significantly easierto ferret out „lapses in judgement.‟ Orboth.” 10 August 2012, 3:34p.m.Tweet.
  11. 11.  DFW Tornados of April 3, 2012: My story The Apple Screw Hoax of August 8, 2012 • Gabby Douglas Hair „Controversy‟
  12. 12.  Sunrise in California: Hoax generators in Sweden post fake internal email from Apple with pictures and schematics of screw to Reddit Spreads virally via Reddit to blogs and then Twitter Mainstream news Websites including Yahoo and Wired pick up story by Wednesday evening Though Wired questions accuracy, rumor thrives and Twitter and millions believe story
  13. 13. Wired Magazine: Wednesday posting on Reddit shows an asymmetrical screw, allegedly designed byApple, that would be impossible to remove with tools currently available on the market.While the authenticity of the screw is in question, and while such a screw wouldcertainly slow down the device dissection efforts of average users, no one should fearthat any specially designed screw would keep out serious DIYers for long.Wired reached out to iFixit co-founder Kyle Wiens to ask his opinion on the legitimacyof the design. According to Wiens, the design is a bit too far-fetched: “My gut feel isthat this isn’t from Apple. The threads are unrealistic, and I suspect that a head like thatis too complex to use as a tool head. Existing tool designs tend to be simple becausethe head needs to withstand a fair amount of torque.” There’s also the issue of price. “If this is an Apple design, it looks like it would be expensive to manufacture. Apple uses tiny screws, and that’s a very complex screw head,” Wiens said, adding in an email, “Tiny + Mechanically Complex = Money.”
  14. 14.  Most people rush to defend the perceived victim, but rush to criticize big powerful corporations Media outlets can either get to truth or fan the flames of rumor After a couple of days, the truth usually comes out, but many never learn it, because they initially believe it and never investigate later.
  15. 15.  Teens and young adults react quickly to rumors and fast-developing situations Schools need to teach them to pause and analyze because this behavior does not come naturally Not only is it about critical thinking, but impulse control
  16. 16. Essential Reading: Net Smart by HowardRheingold
  17. 17. 1. Attention2. Crap Detection3. Participation4. Collaboration5. Network Smarts
  18. 18. Avoiding Mindfulness and Focus and goals distraction Metacognition• Structure class • Thinking about • Reward for time thinking and focus and help what is students set important goals
  19. 19. Triangulate Search terms Skepticism Sources• search for • Don‟t believe • Need 3 sources “critique of” immediately to validate a and don‟t stop and think like a rumor with one detective including search someone or something that checks facts
  20. 20.  Start with simple „like‟ and comment level participation Curation as teaching and learning tool and is related to Crap Detection ◦ Haven‟t libraries always been about curation? Teach students to “assume good will.” This is in counterbalance to Crap Detection
  21. 21. Librarian Make rules Modelhosts virtual clear at expectedcommunity beginnning behavior
  22. 22.  Librarians stand to benefit from building a network and bonding with each other Most successful networkers bridge multiple networks Networking behaviors can be modeled and taught
  23. 23.  Can we tell students to limit their search to trusted library resources? Do we want to make our library users dependent on us or make them independent critical thinkers? Can we get by just teaching search, citation, and other information literacy skills? Can we ban Websites students use such as Wikipedia, Twitter, etc.
  24. 24.  It‟s difficult to justify banning social media in schools It‟s imperative that librarians involve themselves in Social Media enough to understand the new reality of how young people get information and develop belief systems It‟s also very important that schools teach “Net Smart” behavior frequently and no one but librarians will likely fill this void.