Tuesday, August 11, 2015

Module 5 Learning Technologies in the Digital Age

I would consider learning technologies in the digital era to be a relevant topic.  With the widespread use of email, texting, blogs, podcasts,online learning, and other forms of digital communication, the topic of social and ethical behavior is front and center.  In my week 5 discussion (included below) I referred to topics such as email etiquette and internet safety.  Topics such as plagiarism, stealing of software, and sharing of files/data also share concern related to social and ethical issues.  I found an interesting study conducted related to ethics issues and learning technology.  I have included the URL below:

http://files.eric.ed.gov/fulltext/ED492813.pdf


Netiquette

In this blog post, I wanted to include the topic of netiquette.  "Netiquette is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace" (Albion, 2011).  This includes what defines ethically and socially acceptable behavior. By understanding what is acceptable, it is easier to use the various technologies appropriately, using the same standards and values you would in a traditional classroom environment. By acting in a respectful and responsible nature, learning technologies available in the digital era can improve and enhance a student's learning experience and success.

Below is a link to a page on the Albion site listing the Core Rules of Netiquette.

http://www.albion.com/netiquette/corerules.html

Another interesting resource is listed below.  This page addresses topics such as email communication, tone in email, and the use of acronyms and abbreviations:

http://www.learnthenet.com/learn-about/netiquette/

References 

Albion. 2011. Netiquette. Retrieved August 11, 2015. http://www.albion.com/netiquette/.

Below is my Module 5 discussion - since it is related, I wanted to include it here as well.

Learning technologies in the digital era offer benefits and variety to learners and teachers, but also carry exposure to new risks related to social and ethical issues. Technology greatly changes the way people learn. Everyone learns in a different way and technology offers the ability to offer different approaches and delivery methods to engage the learner. Personal ethics are important as well. A company or a school can have shared values and principles, but it is up to each and every individual to own these core values and ethics.

In school and in work, the digital era and various new technologies have changed the way we live, how we learn, and how we interact with others. Technology has become a core part of our lives and our ability to learn. Online learning, collaboration, connectivity, and interactivity all take place using the Internet and socializing takes place through various online sources and methods. We utilize new forms of interaction and connectivity keeping us connected anytime, anywhere with applications and social networking tools like blogs, texting, instant messaging, Facebook, Twitter, YouTube, Netflix, and Instagram, to name a few.  These various tools also exist within schools and the workplace changing the way we learn and retain information. Society today has developed a comfort level with technology and social media which lends itself to this constant level of interactivity. We exchange information instantaneously, and share ideas, thoughts, pictures, and knowledge immediately to any number of people. This all becomes part of learning.

In my workplace, I have various learning outcomes for my learners.  They include the following:

•  Learners will be able to use the learning management system to locate training opportunities
•  Learners will be able to search the course catalog to view various training opportunities and delivery methods
•  Learners will be able to use emerging technologies, social media, and other new media and new technologies to enhance their overall learning experience.
•  Learners will be able to evaluate training through ratings and reviews of training courses.
•  Learners will be able to apply knowledge, information and best practice to their job.


For these outcomes, both social and ethical behavior becomes a critical point. Training is needed to help students and employees understand what is considered right and wrong, and what is considered socially and ethically correct in the digital era.  This can be done through training and education.  For example, at my company every employee has access to email as a means of communication. We have a policy and procedure that employees are familiar with related to the use of email on company and non-company devices, but it is still a challenge to manage and requires ongoing training and re-enforcement.  Other examples would include an understanding of internet safety, confidential information, privacy, information security, and other policies related to use of social media.


Through policies and procedures related to privacy, business ethics, code of conduct, copyright, security, social media use, and internet safety these topics can be addressed and updated as necessary.  As time goes on, technology will continue to change, but there will still be a need for educators, students, business people, and everyone in between to act ethically.  

Thursday, July 30, 2015

Cyberbullying in Higher Education and Beyond…Where does it Start and How can we Control It?

Cyberbullying in Higher Education and Beyond…Where does it Start and How can we Control It?

Since Cyberbullying has become such a big topic, I decided to write a blog entry to address it, specifically in higher education, although not limited to this audience.

In a recent  2015 study entitled An Overview of Cyberbullying in Higher Education, the author states that “electronic media provide people a new environment to misuse technology and anonymously bully others, anywhere, and at all times” (Washington, 2015).

Cyberbullying can take on many forms.  It can include text messages, emails, photos, videos, and any other form of media. I would consider cyberbullying to be a major social issue of the digital age. In terms of higher education, the author states that “College students who have been cyberbullied have committed suicide, dropped out, or endured torment while in school” (Washington, 2015). This is a very scary and sad reality to me.  Bullying in schools has always been an issue or concern, but with the introduction of the Internet and technology, it has been drastically increased and exposure/impact has been broadened. 

The author of this study also touches on bullying in the workplace and how often this occurs, even with adults in the workplace. The article details three recent incidents of cyberbullying.  Although I didn’t go into detail of these specific incidents in this blog entry, they are worth reading. 

Cyberbullying is really a very sad reality of our time, and something that I don’t see going away.  Much like drugs or alcohol in school and in the workplace, I think the only way to address this topic is through a zero-tolerance type program.  According to the author “These three incidents underscore the importance of higher education institutions in contemporary society knowing about cyberbullying and the impact of cyberbullying on college students. This article provides an overview of traditional bullying which may predicate cyberbullying, cyberbullying in higher education, cyberbullying and the law, and recommendations and implications for adult learning” (Washington, 2015).

I found this to be an interesting topic to research.  Since it is such a “new” topic, all the research and studies are relatively new as well.  General awareness of cyberbulling seems to be a main focus in trying to contain and manage it. Also, it seems that although bullying was always considered a playground issue in elementary school, it is now a widespread act that can impact anyone, at any age, anywhere. 

According to another study addressing the prevention of cyberbullying,, The author states that “Cyberbullying may be one of the “diseases” of the 21th Century. Despite efforts to curtail its incidence and prevalence over the past 20 years, its direct and indirect harmful effects have made it a public concern about the wellbeing of children, adolescents, and adults” (Chisholm, 2014). The author addresses means of prevention and recommends legislations on bullying as well as education campaigns as ways to curtail the growing issue (Chisholm, 2014).

References

Chisholdm, J. March, 2014. Journal of Information Systems Education, Vol. 25(1) Spring 2014. Review  of the Status of Cyberbullying and Cyberbullying Prevention. Retrieved July 30, 2015.  http://eds.b.ebscohost.com.library.esc.edu/eds/pdfviewer/pdfviewer?vid=3&sid=77160333-49b7-4d8d-a43c-989a31d736bb%40sessionmgr110&hid=119

Washington, E. Feb. 2015. An Overview of Cyberbullying in Higher Education. Retrieved July 30, 2015. http://eds.b.ebscohost.com.library.esc.edu/eds/pdfviewer/pdfviewer?sid=77160333-49b7-4d8d-a43c-989a31d736bb%40sessionmgr110&vid=2&hid=119



Thursday, July 9, 2015

Blog 3: Young People, Ethics, and the New Digital Era

For my Module 3 Blog, I would like to focus on a report that I read entitled “Young People, Ethics, and the New Digital Era – A Synthesis from the GoodPlay Project.”  This report focuses on a topic that is relevant to our studies in this course.  Although it was written in 2009, it was forward-thinking and addressed many topics still relevant to the digital age today, specifically focusing on young people.  It addresses social media, the Internet, and various means of online communication causing ethical risks and concerns to today’s youth. Although they are digital natives (Prensky, 2001) and savvy when it comes to social media and digital media as a form of literacy, they are exposed to many risks that they are potentially unaware of. Prensky states that “Our students today are all “native speakers” of the digital language of computers, video games and the Internet” (Prensky, 2001). 

This report discusses a project called GoodPlay. Based on the article, ”The goals of the GoodPlay Project are twofold—(1) to investigate the ethical contours of the new digital media and (2) to create interventions to promote ethical thinking and, ideally, conduct” (James, 2009).  The report also focuses on what they consider key issues.  “We argue that five key issues are at stake in the new media—identity, privacy, ownership and authorship, credibility, and participation” (James, 2009). These key issues are concerns for everyone today – not just youth, although I would consider them to be more susceptible to these and other risks.

The report defines GoodPlay as “online conduct that is meaningful and engaging to the participant and is responsible to others in the community and society in which it is carried out. We argue that the new digital media, with all their participatory potentials, are a playground in which five factors contribute to the likelihood of good play—the technologies of the new digital media; related technical and new media literacies; person-centered factors, such as cognitive and moral development, beliefs, and values; peer cultures, both online and offline; and ethical supports, including the presence or absence of adult mentors and educational curricula” (James, 2009). 

Kids are taught right from wrong by their parents, teachers, and others in their lives.  The responsibility that comes from using the Internet or social media requires its own set of rights and wrongs.  In addition to protecting themselves and their personal identity, kids need to understand how to use the Internet in a safe and ethical manner.  Cyberbullying is a great example.  Kids are taught not to bully their peers, but cyberbullying opens up so many other vulnerabilities that they need to be made aware of. Through the use of smartphones, tablets, computers and various gaming systems, today’s kids are constantly exposed. Through online networking, email, and text they are sharing information, pictures, and attachments to name a few.  They need to understand what is considered ethical behavior and what is not, so that they can protect themselves and also learn right from wrong.

Internet in the classroom is another interesting area related to our youth. The Internet offers great opportunities for learning but at the same time, exposes the student and the school to risks if not properly managed.  Below is a chart included in this study called The Ethics of Play (James, 2009). I thought it was worth sharing. The author states that “Our research and reflection have shown us that the ethical stances of young people are shaped by how they manage their identities and privacy, regard ownership and authorship, establish their credibility, treat others, and consider broader civic issues as they participate in online spaces. Five key sets of factors are implicated in these ethical stances (see figure 1)” (James, 2009).


As I read and learned more about this topic, I learned more about Henry Jenkins and the role he plays in regards to young people related to new media.  He has a weblog, with a lot of great information and interviews on this topic as well as many others. The URL is:



References

James, Carrie. 2009. Young People, Ethics, and the New Digital Era – A Synthesis from the GoodPlay Project. The John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning. Retrieved July 9, 2015. https://mitpress.mit.edu/sites/default/files/titles/free_download/9780262513630_Young_People_Ethics_and_New_Digital_Media.pdf

Prensky, Marc. 2001. Digital Natives, Digital Immigrants. Retrieved July 9, 2015. http://www.marcprensky.com/writing/Prensky%20-%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1.pdf


Friday, June 19, 2015

Blog 2 - Email Privacy in the Workplace

As technology usage grows, so does the ethical concerns related to email usage and privacy. In my workplace, employees are asked to acknowledge a policy related to email usage in the workplace.  It is part of a bigger policy addressing internet, email, electronic communications, and information security. The purpose of this policy is to ensure that employees use company computer systems and applications in a legal, ethical, and appropriate manner. The policy also aims to safeguard employees, company assets, and company information.

As a company with over 750 locations across the US and Canada, we rely heavily on email communication. The policy helps to inform employees about email usage and how to utilize sound judgment pertaining to this form of communication.  


The policy also specifies what is considered a harassing or harmful email, what would be considered offensive or inappropriate, and what could be portrayed as harmful. Through these standards, employees are able to understand and recognize what would be considered inappropriate in nature. Also addressed is the concern related to malicious emails. Email is often a target of attack for a company. Spam, spoofing, hyperlinks, and phishing all pose threats to the company, the employees, and its data. Through policies and standards, employees are made aware of these potential threats.

Limited personal use of email is expected and allowed at my company, as long as it is not abused. With this privilege comes the understanding and the expectations related to privacy.  Employees understand that no expectation of privacy exists in any information they send or receive with a company computer or email.  The company has the right to gain access to employee email at any time with or without consent. It is this understanding that helps to protect the company and employees from the misuse of email. 

The study E-MAIL PRIVACY IN THE WORKPLACE - A Boundary Regulation Perspective by Jason L. Snyder, examined employee perception and response related to email monitoring in the workplace. Although companies need to, and are allowed to, monitor employee email usage to protect themselves, the study shares a common perception of a typical employee. According to the study, email monitoring can lead “to a lack of trust in one’s supervisor and organization’s top management. Thus, when employees feel a reduced sense of e-mail privacy as a result of a perceived increase in e-mail monitoring, they are likely to conclude that they are not trusted and are likely not to trust others in the workplace. This can create an unhealthy work environment characterized by a lack of trust”(Snyder, page 276).   The author further states that “it is important to keep in mind that organizations often have good intentions for e-mail monitoring, such safeguarding their own legal interests and protecting employees from harassment”(page 276). This is a balance that the company needs to manage.  I believe that through proper communication setting the expectations related to privacy, employees should understand why a company needs to protect themselves.

Much like my company’s policy related to email usage, the author states that “while this study focused on e-mail monitoring and feelings of privacy, there are many technologies that people use for workplace communication. As the use of new communication technologies such as instant messaging, social networking sites, and corporate blogs becomes more prevalent in the American workplace, they present interesting paths for inquiry for business communication researchers” (Snyder, page 289).


Based on an article from the Monthly Labor Review from back in 2003, employees’ perceptions  at that time were very interesting. According to the study, “almost 55 percent of employees thought that their employers were not monitoring either their Internet usage or the e-mails they sent and received. Further-more, only 57 percent thought that employers should have the right to monitor their employees’ Internet and e-mail usage” (Muhl, page 2). Below are results from a survey conducted then:



A link to the article this came from is below – it offers interesting viewpoints as well as a good look at the change in viewpoint from then until now.

http://www.bls.gov/opub/mlr/2003/02/art3full.pdf 

References:

Muhl, Charles J. Workplace e-mail and Internet use: employees and employers beware. Monthly Labor Review February 2003. Retrieved June 19, 2015. http://www.bls.gov/opub/mlr/2003/02/art3full.pdf

Snyder, Jason L. 2010. E-MAIL PRIVACY IN THE WORKPLACE A Boundary Regulation Perspective. Central Connecticut State University. Journal of Business Communication, Volume 47, Number 3, July 2010 266-294. Retrieved June 19, 2015. http://content.ebscohost.com.library.esc.edu/ContentServer.asp?T=P&P=AN&K=54903037&S=R&D=bth&EbscoContent=dGJyMMTo50Sep7c4yOvsOLCmr02eprdSr6e4SLOWxWXS&ContentCustomer=dGJyMPGttEqvqrVKuePfgeyx43zx.


Tuesday, May 26, 2015

Module 1 Blog - Introduction and Ethics Statement

Introduction

My name is Cathy Mocibob. I live in Patterson, New York with my husband John, son Jason, and my Boston Terrier named Vino.

I work for United Rentals, Inc. as Manager, Learning and HR Systems within the Human Resources department. I have been with the company since 2003. In my position, I oversee web-based training for over 12,000 employees nationwide, as well as in Canada. I am looking forward to learning new ways to improve my we based training offerings through design and development techniques.

I have a BS from ESC in Business, Management and Economics with a concentration in Human Resource Management. I have chosen to pursue a Master’s Degree in Learning and Emerging Technologies with ESC. This is my second semester. This summer, I am also taking Designing Online Learning Environments.

In my spare time, I enjoy shopping, wine tasting, yoga, spinning, watching professional sports, and traveling with my family.

Personal Ethics Statement

Personal ethics are very important to me both personally and professionally. Throughout my life I have chosen to sustain certain core values including effective communication, time management, responsibility, integrity, honesty, and consistency.  In addition, I have a strong work ethic and consider myself to be organized, hardworking, and consistently strive to maintain a positive attitude and strategic outlook in my work and personal life. I feel that these core values make me the dedicated wife, mother, employee, and student that I consistently strive to be. As I learn, grow, and develop my skills, I reflect on my behaviors and decisions towards continuous improvement.  

In my workplace, I oversee ethics and compliance web based training.  It is my personal belief in the importance of business ethics that helps me to continuously improve and promote this program and make it a value for my company and our employees. Through my company's business code of conduct and my own personal code of conduct, I am able to define who I am and what my beliefs are - in an effort to reflect those attributes to others in both my business and personal lives. I chose to lead by example, and act as both a role model and mentor to others.