Well this is the last post I will be doing for UOSM2008 but as the title says this is not the end its only just the beginning…

Have a look at my summary blog which I created on Weebly!


Topic 5: Reflection

The topic of Open Access was one that has once again been a topic I had not really thought about until this week. The responses this week from my peers manifested many different comparisons and examples but it was comforting to watch- read- listen to how many of us support Open Access.

Sophie’s blog from the previous group actually inspired me to produce my first ever Youtube video which I incorporated into my Prezi.

prezi twitter

Olivia had a very clear blog explaining the topic; she spoke about a case where an author that had his book downloaded 3 million times since 1999 after making it free online.  This was a great argument in proving how successful Open Access can be when implemented in the right way. She also discussed the advantages for the developing world, something that I had covered to in my Prezi. Whilst her points were valid, I was able to ask her about whether she felt that the developing world should be made a priority when it comes to open access. Her blog and mine made me reflect on whether more effort should be taken in helping others progress in their research. Whilst I have difficulty accessing articles for essays, I believe that there are people who need free access more desperately. There should be more effort made to improve free online content for developing countries in order to help them progress in their research about serious issues like environmental problems and illness.

One of my peers gave a very strong opinion in favour of Open access. Namat  spoke about how he finds it very difficult to understand why people would not want to make their data available to everyone to see. Whilst I am in agreement with him, I thought about the consequences of having all data freely available online. I questioned him on whether he thinks making all content free online would have grave effects on traditional resources like libraries.

What I had not thought about was what Hayley mentions regarding the music industry. Whilst it is clear that piracy is a principal issue with free access to music, as a user of Spotify I am highly in favour of using the internet to access music. In my opinion the ability to share music freely can only help to improve its popularity and therefore increase an artist’s success rather than damage it!

To conclude, to live and work on the Web is undeniably complex, but it does however provide numerous benefits for online users. What is clear is that while every topic in this module has been different, each one has shared themes that are related in one way or another.



My Comments:

Hayley’s Blog:

My Prezi:

My Youtube Video:

Namat’s Blog:

Olivia’s Blog:

Sophie’s Blog:

Topic 5: The Advantages and Disadvantages of Open Access.

For my final topic, I have chosen to do a prezi to present my ideas!

Here it is…Open Access



Edanz.2015. Advantages and Disadvantages of Open Access.[Online]. Available at: [Accessed on 28/04/15]

Elliott, S. 2015.”Benefits of Open Access” [Online] Available at [Accessed on 29/04/15]

Hall, M. 2014. Why Open Access Should be a Key Issue for University Leaders. Available at: [Accessed on 28/04/15

PHD Comics (2012) Open Access Explained. Available at: [Accessed on 28/04/15]

SPARC Europe, 2015.Benefits of Open Access. [Online]. Available at: [Accessed on 28/04/15]

Wikipedia, 2015. Available at: [Accessed on 28/04/15]

Topic 4: Reflection

This topic has provided me with a wide range of views that I had never really thought about before starting this topic.

While in my post I spoke about the ethical issue of cyber bulling in education and the effects it has on students but also in daily life, Zia and May took a different approach.

May spoke about the business side with a twist by comparing her experience as a journalist which made me question the common issue of freedom of speech. I proposed to her the solution of having profiles that are user-rated in order to allow other users to rate people on what they said. By doing this when people like May are monitoring comments posted they are easily able to filter the users who abuse their “freedom of speech”. By interacting online with May about her blog has enabled me to broaden my opinion on these ethical issues that previously I would not have been able discuss!

While May’s blog provided an interesting side to ethical issues in business it was encouraging to read Zia’s take on social media in education. Given that I spoke about the negatives of this, Zia chose to discuss how helpful social media can be in education. He also introduced me to Coursera which I learnt about only through reading his blog. I have been learning more about skills I need for the future, one course I found very useful was on negotiation skills. Zia and I both talk about the dangers of not being aware when interacting online. From reading the blogs of peers it has highlighted that cyber education/training is the best way to ensure we reduce further issues along with enhancing new/appropriate ways of interacting online.

The complexity of ethical issues in education and business is highlighted repeatedly in “Living and Working on the Web’, we have seen in Topic 3 that our social and professional lives may overlap and the problems that have arisen from that. The principle point to be made is that nowadays the majority of the population live and work on the web and in reality we cannot escape that. But what can be done is to make changes from the very beginning. Children will one day become business men and women, if they are taught while in education the correct ways to live and work on the web, they would be able to follow through with these skills when they enter into the business world.

Words: 411

My Comments:

My Blog:

May’s Blog:

Zia’s Blog:


Topic 2: Reflection

This topic has been one of the most interesting for me; the term “Multiple Online Identities” at first seemed a simple concept but after reading my peers comments my opinion changed.

It was interesting to see how unaware we are of the issue with Tatiana demonstrating how easy it was for someone to steal her personal photos.  She also spoke about the documentary Catfish which was useful as I was able to compare her opinion on the programme to mine. I questioned her on whether she saw the beneficial side of the media glamorising these programmes as I believe it makes the young generation who are surprisingly naïve to these problems more aware of them.

Jens questioned whether someone’s online identity should be determined before they engage themselves online.  I had not thought about the benefits of new online users knowing exactly who they want to be seen as when they are online. If someone is certain on having one identity and not multiple before they go online they are more likely to ensure this one identity is protected and therefore, act in an appropriate manner.

Whilst reading through my peers blogs, I came across a study that showed that 49% of social network users do not provide their real name for their online identity. I was very certain that multiple identities were not a necessity after looking at the negatives mentioned in my blog. But Tamara cleverly showed the pros to multiple identities that should be considered before coming to a concrete decision.

I believe still that multiple identities and being anonymous online will entail risks. However, the web is there to allow freedom of speech for people who do not have the confidence to speak in the real world and whilst the issues of identity theft and cyber bulling are serious it does not give us the right to take this freedom away from those who need it most.

Topic 2: Me Myself and I, Multiple Identities

no one knows youre a dog

(Krotoski, 2012)

Am I who I say I am?

Who am I really?

Online identity

The issue of identity theft is one that has gone from traditionally being associated with offline methods to ever more increasingly occurring online (Milne et al, 2004, p.219). Marcus et al (2006, p.1014) define online identity as “actively constructed presentation of oneself”.  Given the wide scope of online mediums it is true that we are actively building our online identity by engaging in social networks. On the other hand, it is very easy for someone to build an online identity but also adapt it to appear differently to their identity in real life.

Lets have a look at my online identity..


You can see that across the four social and professional profiles I have the same name and in most cases used the same pictures. Even though it is not shown, my security settings regarding friends and personal information have been managed identically for each profile.

While I have tried to maintain the same online identity there are many cases where unknowingly peoples profiles are stolen.

The term catfish has been created as a result of this which means: Lure (someone) into a relationship by adopting a fictional online persona (Oxford Dictionaries, 2015)

Some students from University of Southampton have recently been targeted by catfishing as this article explains. While the consequences for these girls were not severe, some cases of catfishing have been devastating for the people involved as they have fallen in love with someone over years of communicating with someone who is not genuine. The documentary Catfish has become well known internationally which has followed cases like these.

Costa and Torres (2011, p.51) argue that being part of the networked society is no longer a question but an issue we have to deal with. Social networks now play a major role in creating our online identity and in my opinion trying to be someone you are not but also tricking other people with a fake identity should in no way be permitted. Thus, it is down to you to be aware of the people you engage with on social media but also how you create, manage and secure you own “online identity” in order to prevent what has happened to so many other people happen to you.

384 Words


Adsett, G. 2015. Girls Lacrosse Team Plagued by Serial Catfisher. The Tab. [Online] [Accessed on 24/03/15] Available from:

Cristina Costa and Ricardo Torres, 2011 To be or not to be, the importance of Digital Identity in the networked society, Revista Educação, Formação & Tecnologias, n.º extra: pp. 47‐53.

Joseph, M. 2012. “Catfish: The TV Show Trailer”. [Online]. [Accessed on 22/03/15] Available from:

Krotoski, 2012Online identity: is authenticity or anonymity more important? [Accessed on 22/03/15] Available from:

Marcus, B., Machilek, F., Schutz, A (2006) ‘Personality in cyberspace: personal websites as media for personality expressions and impressions’ Journal of Personality and Social Psychology. 90(6). p.1014-1031.

Milne, G et al. 2004. Consumers’ Protection of Online Privacy and Identity. The Journal of Consumers Affairs. 38(2).  [Online] Accessed on [24/03/15]. Available from:

Oxford Dictionaries, 2015. “Catfish”. [Online]. [Accessed on 28/03/15]  Available from:

Topic 4: Education says no to Cyberbulling

Ethics  the study of what is morally right or wrong (Cambridge Dictionary. 2015)

While ethical issues have been apparent in education, it is now in our new era where it has become most prevalent.  As topic 3 discusses the wide use of social media in modern day society, Friesen and Lowe discuss how it can help student “learning” by giving them greater autonomy (Friesen and Lowe, 2012).

Although the incorporation of social media in the pedagogical world has brought about benefits for most learners (my blog being one of them) it has also damaged the relationship that we have with it through many students abusing their rights on social online mediums leading us to Cyberbulling.

The question we need to ask ourselves is it ethical for schools to prohibit their student;s freedom of speech in their social media use?

What is Cyberbulling?

The bbc offers a clear video explaining exactly what cyberbulling is

Cyberbulling has become an international issue that many schools are aware of. When I was at school the site Little Gossip was created which was a site allowing for students to comment anonymously about other students from different schools. Unfortunately, this site became an obsession for many people at my school and caused hurt and distress for many pupils. While the site has been removed now, the fact of the matter is that it should never have been created in the first place. Even though this one example of cyberbulling was ceased, the problem is far from over.

“About 75% of students admit they have visited a website bashing another student” (Do Something.Org)

What is being done?

There exists many organisations that are helping this problem,  for example, Cybersmile and in November we witnessed Anti-bulling week. Many schools now have PSHEE classes incorporated into their curriculum. Thompson and Goldsmiths show the effectiveness of informing children about bullying through PSHEE. (Thompson and Goldsmiths, 2010)


Canada Safe School Network recently posted this video which was moduled on the style of Jimmy Kimmels famous “mean tweets” sketch to raise awareness of this issue

 What can be done?

  1. Use social media with homework and in lessons to show students what social media is supposed to used for
  2. Improve cyberbulling education
  3. Inform pupils at a young age of the consequences so they are aware in the future.

It is clear that cyberbulling is an ethical issue that unfortunately occurs in the majority of schools and while social media is increasingly being used by younger children, it is fundamental that before they get access to Facebook or Twitter accounts they are taught the correct way to behave when using it.

Have a look at my infographic below

Untitled Infographic

Words 404


My blog- Topic 3

My Infographic- image

Anti-bullying Week. 2015. [Accessed on 18/03/15]. Available from:

BBC. 2015. Understanding Cyberbulling. [Accessed on 19/03/15]. Available from:

Cambridge Dictionary. 2015. Ethics. [Accessed on 19/03/15]. Available from: 

Canada Safe School Network. 2015. Kids Read Mean Tweets. [Online]. [Accessed on 19.03.15]. Available from:

Cybersmile.2015. [Accessed on 18/03/15] Available from:

Friesen and Lowe, S. 2012. The Questionable Promise of Social Media Education: Connective Learning and the Commercial Imperative. Journal of Computer Assisted Learning. [Online]. 28. p.184. [Accessed on 19/03/15]. Available from:

Little Gossip. 2011. Little Gossip Website Closes due to Unwanted Comments. [Accessed on 18/03/15]. Available from:

Thompson, F and Goldsmiths. P. 2010. The Use and Effectiveness of Anti-Bullying Strategies in Schools. [Accessed on 19/03/15]. [Available from:

Topic 3: Reflection

Topic 3 was personally very insightful given that an authentic and professional profile is something that is a great importance to me as I graduate in July. I was initially very surprised to see how social media plays a large role in aiding employers to choose the right candidate. After reflecting on Topic 1 and 2 it was clear to me that in fact this is completely expected as popularity towards social media has grown massively.

Despite this, Jack suggested using blogs as an alternative niche platform to LinkedIn which I thought was very clever. I am a strong believer in making yourself stand out from the crowd and will definitely continue to use my blog to demonstrate to potential employees other skills that I have.

While Jack spoke about alternatives to LinkedIn,  many of my other peers spoke in detail about the benefits of LinkedIn, Hayley being one of them. Personally, even though this domain is “professional” and  beneficial for anyone looking for a job, I believe it should not become a persons only professional profile. Many of my friends and me included thought that having a LinkedIn profile was equal to a tick on the checklist for being professionally visible online. After completely this task I realised we could not have been further from the truth. The increase use of social media has meant that our profiles are currently more in the “professional” light than ever. What we tweet, like, post etc is seen by not just by our friends but maybe even our future managers. As a job seeker  myself I know now to be more aware of my interactions and networks online.  I forget and I am sure many of my fellow peers do too, that if we as potential employees use these domains (Facebook, Twitter, Instagram) so frequently, then  future employers will also use them too.

I have made some changes to my social media profiles in order to make them “profesisonal” and “authentic” and I hope now that I am aware of how important it is that I can help other graduating students to follow the same steps I have taken.

facebook profile

My Adjusted Facebook Profile

Words 360


Jack’s Blog

Hayley’s blog


blog 3

Ollier-Malaterre et al., 2013 p.647

This week’s topic is one that as a final year student has been very eye opening. Due to the massive increase in popularity with social media, many people are using it as a domain for a professional use as well for social use. As social and professional networks co-inside it has become even more fundamental that job searchers differentiate their social profile from that of their professional, or simply maintain an authentic but professional profile.

Many people, including myself do not necessarily think about the consequences of your online profile when applying for jobs, however given that 45% of employers look at the online profile of a potential candidate before hiring,  (Wall Street Journal, 2015) a profile that is non-professional profile would prevent any potential offers. EmployeeScreenIQ gives a more detailed discussion on the use of social media for employing candidates.

In a survey carried out by PotentialPark (2013) we see that Facebook is one of “the most important places for talent to meet employers online”. Personally I was surprised by this as I have considered LinkedIn to be the professional platform for these developments to take place. This leads me to question whether social networks are replacing professional networks when it comes to developing a professional profile?

My Linkedin profile is something I have recently set up in order to have professional profile but personally, I have never thought about how Facebook could aid me in this process or more importantly what my social profile would look like to someone assessing me professionally.

After reading about the incident of a employee getting fired because of something they liked on their Facebook (Gross, 2012)  I decided to assess how my Facebook page would look like to an employer when focusing on the “likes” section.

likes 2. final

likes 4. final

From just two pages of my likes (downward arrow= should not be visible), I had many concerns, firstly, I had no idea that I had liked some of the pages shown on my Facebook (the I like cuddles.. they make everything better… was one to swiftly be removed) but secondly, that I would be not happy with an employer seeing most of them. From demonstrating how many likes I was unhappy with and that I would deem “unprofessional” shows the importance of being cautious and conscientious when being on social media. This video gives a quick explanation of how to control the accessibility of your likes on your Facebook.

The key to maintaining an authentic and professional profile is to ensure that before you do anything on Facebook, Twitter etc you are aware of who can see your profile but also that you have thought your social media activity and whether it could have any negatives consequences.

This Prezi gives a visual explanation of how to maintain an authentic and professional profile.


452 words


My Facebook– likes

EmployeeScreenIQ, 2013. The Pro & Cons of Screen Job Applicants Using Social Media. [Online] Available at: [Accessed on 03/03/15]

Gross. D, 2013. Virginia Deputy Fights His Firing Over a Facebook “Like” Available at: [Accessed on 03/03/15]

Mindflash, 2011. Social Screening: How Companies Are Using Social Media To Hire & Fire Employees. Available at: [Accessed on 04/03/15]

Ri5, 2013Potentialpark releases UK survey results. Available at: [Accessed on 03/03/15]

SSUCCE, 2014Managing Social Media: The Good, The Bad and The Ugly. Available at: [Accessed on 04/03/15]

Topic 1: Reflection

This week’s topic of the digital “visitor” and “resident” has been an interesting and informative one for me.  To be honest, I had never heard of these concepts before carrying out this task but through just two weeks of critically analysing my peers activity and comments online I have been able to broaden my knowledge of the concept but more importantly, deliberate about my initial theory.

When initially reading about Prensky’s model I found that to an extent he was correct but favoured White and le Cornu theory because of their specificity towards what a digital user could be.  After reading through May’s blog, I started to realise that there is a discrepancy in White and Le Cornu theory. May compares the digital usage of her father and her sister to show that he uses the internet for professional reasons while her sister for social. When I relate this to my family I see that there are similarities but that my mother uses the internet for both social and professional reasons. This could make her a resident but given her limited digital knowledge it would seem that this assumption is erroneous. Therefore I started to think that we cannot simply define a person as a “resident” or “visitor” because every person has distinct ways of using the internet.

Aliyu included White’s YouTube video in his blog which discusses his theory in depth (a great way of providing the reader a thorough explanation of the topic!) Even though his video evaluates the idea of it being a continuum “not two hard edge categories” I still do not believe that people use a combination of both digital and visitor modes. Leigh discusses refraining from using social media due to privacy risks which contradicts Whites concept along with my dad who uses the internet widly for professional means but sees “no point” in using social media.

As a result I think it would be fair to say that one cannot simply determine someone as a digital “resident” or “visitor”