Our Feeds

Friday, 15 November 2019

Jayan Blogger

If You Read Nothing Else Today, Read This Report on What Is Social Media Used For

Last week NBC news announced that some Colorado school districts are creating tougher social media policies for staff in hopes of preventing inappropriate relationships with students. While banning staff from connecting with students is certainly the easy way out, doing so not only fails to prevent inappropriate relationships, but it also fails to prepare students for success in the 21st century. The problem with such policies is that they are based on the premise that social media causes inappropriate behavior. The reality is that social media doesn't cause inappropriate behavior. It catches it. Policies like this don't address the real concerns a district may have about inappropriate behavior. It just drives it underground while also criminalizing teachers. The policy also shows a lack of understanding around how social media sites like Facebook and Twitter work. Districts with an understanding of social media know that teachers and students can interact using social platforms without friending / following by using strategies such as creating groups, pages, or using hashtags. This is important because our students need role models like teachers to guide them when it comes to responsible use. When students and teachers interact online that is exactly what happens.


’t expecting their students to see their pictures of family and friends.

newspaper articles on social mediaDistricts like New York City get it. Not only do their policies allow students and teachers to interact online, they provide social media guidelines for both students and staff to do so. What's more, the student guidelines were created for students with students. Parents, teachers, Statista and administrators also contributed. The guidelines don't stand alone. They are accompanied by a parent and teacher guide which include professional development. The student guidelines have teen-friendly infographics which were created because that's how teen's say they prefer getting information. This approach seems to be working. ’t expecting their students to see their pictures of family and friends. Principals were calling my office daily, saying, ‘We welcome social media but we’re scared.’”The social media guidelines for educators have been effective, Jackson-Chase said. While districts in Colorado proudly highlight teachers who don't see a place for social media in the classroom, places like New York City have a more enlightened approach. They are celebrating staff and students who are using real-world (not just school-based) social media to make global connections, engage families, develop learning networks, and build a positive digital footprint.


Would you put your full resume online for everyone to see?

Search is a new area where users are gaining control of what others are allowed to see. Some sites let you set limits on who can see search results about you on the social networking site. If you’ve just joined a social networking site, or even if you have been a user for some time, log onto your account and view and adjust the privacy settings -new settings are often added over time. Would you put your full resume online for everyone to see? LinkedIn also offers some capabilities to restrict information. You can close off access by others to your network of contacts, something you don’t have to share if you don’t want. This is a common practice by sales professionals and recruiters not wanting to expose their valuable network to others who might poach customers or prospects from them. There are lots of reasons (most of them bad) why someone might impersonate or falsify an identity online. It could be as a prank or for “fun” such as those who impersonate a celebrity as satire.


If the content on the site doesn't look like or sound like the person you know, avoid it.

Faking an identity has a legit side too - it can be used by people who simply want to conceal who they are in order to protect their real identities. But its also the first step of those who want to embarrass or defame someone else by impersonating them, or steal an identity for financial gain or other crimes. Two security researchers demonstrated at the Defcon/Black Hat 2008 conference how easy it is to set up a Facebook or LinkedIn site using a false or impersonated identity, including links to malicious sites. The question becomes, how can you verify that the page page belongs to who you think it does before sharing too much information or clicking on links? Start by being on the lookout for anything unusual or out of the ordinary. If the content on the site doesn't look like or sound like the person you know, avoid it. E-mail or call your friend to verify the site is legit. Let them know, too, if you think someone else is faking your friend's identity online.


Latest New Social Networking Sites

top social media companiesYou wouldn’t put a note on your front door stating, “Away for the weekend… Returning on Monday.” Micro-blogging tools like Twitter and What are you doing right now? Facebook, LinkedIn and other social networking sites make it easy to let details slip you wouldn’t otherwise tell friends or strangers. Be aware of what information you put out there which others might use for nefarious purposes. Micro-blogging tool are a bit like the proverbial frog in slowly warming water that’s eventually brought to a boil. Over time, seemingly innocuous information can be pieced together, giving lurkers a much more complete and rich picture of you, your family, your habits and other personal information. Software like Twitter is often used at conferences, parties and other social scenes where alcohol is consumed. That makes it even easier for personal details to slip out for the world to see. Twitter users frequently use it to communicate and share their travel woes, giving clue to others that you aren’t at home, leaving your family or possessions at risk for intruders.


Just keep that in mind as you share tidbits of your life on micro-blogging tools. You might want to be a little bit less specific in your tweets. TIP 7 - Search yourself It is a good idea to search your name on Google and check out your profile as others see it on social networking sites. Understand where you show up and what information is available about you, and then adjust your profile, settings and habits appropriately. Don’t worry, it’s not vain if you only search your own name once a month or so. If you unexpectedly see your name in locations you don’t frequent, it could give you a heads up someone else is using your identity online. Set up a Google alert with your name, which emails you when Google finds your name on sites. While some names, like John Smith, are so common they would generate lots of false positives, you may still find out a lot about where your information is appearing online.


popular social media websitesEven if you find there are others online with the same name, it can help you avoid confusion, (or maybe it’s an opportunity to reach out and connect to someone with the same namesake). You’ve probably heard about an employee who was outted when playing hookie because they called in sick but blogged or Twittered about their escapades that same day. But there are more serious reasons you might be let go from your job due to the use of social networking tools. As blogging and social networking sites enter the workplace, so too are corporate acceptable use policies (AUP) being updated to define boundaries for employees, contractors and the company. Data leakage incidents (loss of corporate, confidential or customer information), making inappropriate public statements about the company, using corporate resources for personal uses and harassing or inappropriate behavior toward another employee can all be grounds for reprimand or dismissal.


what is social about social mediaSocial networking sites are another way those things can happen and they create an easy digital paper trail to investigate. Data leakage (or loss) prevention is currently one of the hottest areas in security. Companies are looking for ways to prevent company confidential and proprietary information from slipping through the firewall. Most incidents probably occur via email or file transfers but IM chat tools, blog posts, Twitter messages and even online resume content could disclose proprietary company information. Even using social networking sites on company time or using company resources could be a violation of the company’s acceptable use policy. Before you become the corporate poster child for some publically humiliating episode from using social networks at work, check your corporate AUP to make sure you aren’t violating the policy. Social network sites are typically free to use which means they are making their money by advertising to you. And that means they are collecting information about you.


Social Media Agentur

Is your information shared with outside companies and partners? What information can third-party plug-in software, such as Facebook Applications, use from your profile or page content? Review the site’s privacy policy and watch closely the privacy settings you can control. There is currently a lot of M&A activity in the social networking software industry. A significant part of what an acquirer buys when acquiring a social networking company is the community of users on the site. Your account, including personal information, trades hands from the old company to the new one as part of the transaction. Privacy statements on sites like Digg discuss situations like this. The new owners may have new and different plans for using the information contained in the site. Changes in privacy policies may follow an acquisition. Watch for this when you hear about an acquisition and always read notifications about changes to privacy terms, acceptable use policies and user agreements.


It is best to only friend people who really are or have become your friends.

latest news on social networking sitesPut a number on something and suddenly you have a competition. The person with the most “friends” isn’t necessarily the winner in social networking, unless of course you are running for president or you are in some type of recruiting, sales or media business. That’s just more people, including possibly strangers, who now have access to more of your information. It is best to only friend people who really are or have become your friends. Your personal information has less opportunity for misuse. If you do get an unsolicited invite to connect, check them out first and try to figure out why you know them or if you even do at all. For some, blogging and social networking sites are more than casual places for casual connections. Presidential candidates use MySpace and Facebook to reach out to constituents and hundreds of thousands of potential voters. Industry thought leaders and influencers use blogs and twitter to build up communities of readers and followers for business purposes.


Cool Social Networking Sites

That may also be your reason for being a part of online communities, but if your intentions are more casual in nature, massive readership is probably less important to you. Some sites, like Linkedin, discourage blind connections and will begin restricting a user’s ability to connect if they receive too many I don’t know this person responses. Keeping your network to people you really do know helps keep the spam and other unsolicited messages to a minimum too. Bigger isn’t always better. There’s more to social networks than MySpace, Facebook and Twitter. Self forming communities often form around very narrow topics and these can easily get lost on the bigger sites. You may be better served creating a smaller, more focused network using tools aimed to help narrow or smaller groups such as Ning, or Meet Up. By narrowing your purpose and using tools appropriate for smaller groups, you can keep unwanted solicitations, invites to connect, applications and spam to a minimum. You'll also find you build closer relationships amongst community member. OpenID is an open source standard for creating a single sign-on to multiple online services and applications. As a framework, OpenID accounts are available from multiple providers. Companies like AOL, Microsoft, Sun, and Novell are beginning to accept and provide OpenIDs. It is estimated that there are over 160-million OpenID enabled URIs with nearly ten-thousand sites supporting OpenID logins. OpenID is making inroads into the SaaS application market to better manage user accounts. We’re also likely to see OpenID used in online social networking sites (for instance, IntenseDebate uses OpenID) to help verify users identities and reduce impersonators and false identities. If the social networking sites you frequent don’t use OpenID or a similar technology, e-mail the site creator and lobby for adding it.


Social Media For Dummies

social media todayWhile the burgeoning trend in online social networks has gained much attention from the media, few studies in library science have yet to address the topic in depth. Findings suggest that librarians are overwhelmingly aware of the "Facebook phenomenon." Those who are most enthusiastic about the potential of online social networking suggested ideas for using Facebook to promote library services and events. While some librarians were excited about the possibilities of Facebook, the majority surveyed appeared to consider Facebook outside the purview of professional librarianship. Emphasis in this study centers on librarians' awareness of, experimentation with, and attitudes towards Facebook and whether or not they have created policies to regulate or block access to the site on public-access computers. As librarians struggle to develop innovative ways to reach users beyond library walls, it seems logical to observe online services, such as Facebook and MySpace, which appeal to a huge portion of our clientele. From a purely evaluative standpoint of the site as a database, the authors were impressed by several of the search features offered in Facebook.


Graph-theory algorithms and other advanced network technology are used to process connections. Block or limit who may view profiles, providing users with built-in privacy protection if the user so wishes. Arguably, much of the information provided by Facebook is not academic in nature. However, an evaluation or review of Facebook might provide useful information to instruction librarians and database vendors regarding interface design and search capabilities that appeal to students. Provitera-McGlynn suggests that facilitating learning among millennials, who "represent 70 to 80 million people" born after 1992 (a large percentage of Facebook members) involves understanding how they interact and communicate. Awareness of students' cultural and social interests, and how they interact online, may help older generations of academic librarians better connect with their constituents. Although social networks have been the subject of study by sociologists for years and social network theories have been established to describe how these networks function, Salary: Social Media Marketing Specialist the study of online social networks has received little attention from the scholarly community. Garton, Haythornthwaite, and Wellman were among the first to describe a method, social network analysis, for studying online social networks. Their work was published years before online social networks similar to Facebook evolved.


Social Media O Que é

Currently, the literature on these networks is predominantly limited to popular news publications, business magazines, occasional blurbs in library science and communications journals, and numerous student newspapers. Although evidence of interest in online social networks is apparent in librarian Weblogs and forums (many librarians have created Facebook groups for their libraries), actual literature in the field of library and information science is scarce. In case you have any issues relating to in which as well as how to use Whatsapp best social networking sites.Where chat person number contact list write Happy Year Whatsapp Status 2017 whatsapp status, you possibly can email us at our internet site. Dvorak questions the lack of interest displayed by the academic community toward online social networks as a focus of scholarly research. Facebook membership extends beyond students to faculty, staff, and alumni. Shier cites examples of professors who used Facebook to connect or communicate with their students, including the president of the University of Iowa and more than one hundred professors at Duke University. Professors who teach online courses make themselves seem more human or approachable by establishing Facebook profiles. Bill Drew was among the first librarians to create an account and profile for his library, the SUNY Morrisville Library. As of September 2006, nearly one hundred librarians had created profiles or accounts for their libraries on Facebook.


One month later, however, the administration at Facebook began shutting down library accounts on the grounds that libraries and institutions were not allowed to represent themselves with profiles as though they were individuals. In response, many of these libraries simply created groups for their libraries, which is completely appropriate, similar to creating a profile, and just as searchable as having an account. The authors of this study created the "Houston Cole Library Users Want Answers!" group, which currently has ninety-one members. Library news and information of interest about the library is announced in the group. In February 2006, 244 surveys were mailed to reference or public service librarians (when the identity of those persons could be determined). A series of questions on the survey queried respondents about their awareness and degree of knowledge about Facebook. The overwhelming majority of librarians were aware of Facebook's existence. Out of 126 librarians, 114 had at least heard of Facebook; 24 were not familiar with the site.



Topic title: If You Read Nothing Else Today, Read This Report on What Is Social Media Used For
Topic covered: latest updates on social media, recent news about social media, social advertising, social media marketing website, social media video

Subscribe to this Blog via Email :
Previous
Next Post »