Journal of Computing in Higher Education

, Volume 29, Issue 2, pp 218–239 | Cite as

Sociotechnical stewardship in higher education: a field study of social media policy documents

Article

Abstract

Social media use has risen in higher education, as campus stakeholders frequently access these technologies for teaching, learning, research, communication, and information sharing. With these connected, digital technologies, our colleges and universities understand there are both opportunities and threats that social media affords. Higher education has increasingly witnessed a number of challenging incidents and abuses online. As a result, a number of institutions are evaluating policies and practices to regulate online behavior and establish community standards for students, staff, and faculty. Using latent semantic analysis, 36 universal topics are extracted from the 250 policy documents. This study not only establishes reference database of social media policy documents representing ten countries, it also forms the ontology to develop the framework foundation of sociotechnical stewardship to support strategic, long-term technology planning for organizations and their stakeholders.

Keywords

Sociotechnical Stewardship Higher education Policy Social media Latent semantic analysis 

References

  1. Al-rahmi, W. M., Othman, M. S., & Yusuf, L. M. (2015). Social media for collaborative learning and engagement: Adoption framework in higher education institutions in Malaysia. Mediterranean Journal of Social Sciences, 6(3 S1), 246.Google Scholar
  2. Barber, W. (2014). Digital narratives: Examining evolving teacher-learner roles in authentic online communities. In European conference on e-Learning (p. 48). Copenhagen: Academic Conferences International Limited.Google Scholar
  3. Bertot, J. C., Jaeger, P. T., & Hansen, D. (2012). The impact of polices on government social media usage: Issues, challenges, and recommendations. Government Information Quarterly, 29(1), 30–40.CrossRefGoogle Scholar
  4. Bertot, J. C., Jaeger, P. T., Munson, S., & Glaisyer, T. (2010). Social media technology and government transparency. Computer, 11, 53–59.CrossRefGoogle Scholar
  5. Blaschke, L. M. (2014). Using social media to engage and develop the online learner in self-determined learning. Research in Learning Technology, 22, 21635.CrossRefGoogle Scholar
  6. Brenner, J., & Smith, A. (2013). 72% of online adults are social networking site users. Retrieved from http://www.pewinternet.org/Reports/2013/social-networking-sites.aspx
  7. Bumguardner, K. M., Strong, R., Murphrey, T. P., & Dooley, L. M. (2014). Examining the blogging habits of agricultural leadership students: Understanding motivation, use, and self-efficacy. Journal of Agricultural Education, 55(3), 32–42.CrossRefGoogle Scholar
  8. Collins, A., & Halverson, R. (2010). The second educational revolution: Rethinking education in the age of technology. Journal of Computer Assisted learning, 26(1), 18–27.CrossRefGoogle Scholar
  9. Constantinides, E., & Zinck Stagno, M. C. (2011). Potential of the social media as instruments of higher education marketing: a segmentation study. Journal of Marketing for Higher Education, 21(1), 7–24.CrossRefGoogle Scholar
  10. Cooke, S. (2015). Social teaching: Student perspectives on the inclusion of social media in higher education. Education and Information Technologies. doi:10.1007/s10639-015-9444-y.Google Scholar
  11. Council for Advancement and Support of Education. (2014, March 18). Best practices in social media: Summary of findings from the fifth comprehensive study of social media use by schools, colleges, and universities. Retrieved from http://www.case.org/Samples_Research_and_Tools/Benchmarking_and_Research/Surveys_and_Studies/Social_Media_Survey.html
  12. Coussement, K., & Van Den Poel, D. (2008). Improving customer complaint management by automatic email classification using linguistic style features as predictors. Decision Support Systems, 44(4), 870–882.CrossRefGoogle Scholar
  13. Cowan, R., & Jonard, N. (2004). Network structure and the diffusion of knowledge. Journal of Economic Dynamics and Control, 28(8), 1557–1575.CrossRefGoogle Scholar
  14. Darling, E. S., Shiffman, D., Côté, I. M., & Drew, J. A. (2013). The role of Twitter in the life cycle of a scientific publication. arXiv preprint arXiv:1305.0435.
  15. Daugird, D., Everett, M., Jones, M., Lewis, L., & White, A. (2015). Diversity and inclusion in social media: A case study of student behavior. Journal of Cases in Educational Leadership, 18(1), 92–102.CrossRefGoogle Scholar
  16. DeAndrea, D. C., Ellison, N. B., LaRose, R., Steinfield, C., & Fiore, A. (2012). Serious social media: On the use of social media for improving students’ adjustment to college. The Internet and Higher Education, 15(1), 15–23.CrossRefGoogle Scholar
  17. Dignath-van Ewijk, C., Fabriz, S., & Büttner, G. (2015). Fostering self-regulated learning among students by means of an electronic learning diary: A training experiment. Journal of Cognitive Education and Psychology, 14(1), 77–97.CrossRefGoogle Scholar
  18. Duggan, M., Ellison, N. B., Lampe, C., Lenhart, A., & Madden, M. (2014, January 9). Social media update 2014. Pew Internet Research. Retrieved from http://www.pewinternet.org/2015/01/09/social-media-update-2014/
  19. Eaton, V. J., Luse, D. W., & Hodge, T. G. (2012). An examination of social media policy usage of south central United States’ Universities. Journal of Academic Administration in Higher Education, 8(1), 33–41.Google Scholar
  20. Epstein, T. L. (2012). Regulation of student athletes’ social media use: a guide to avoiding NCAA sanctions and related litigation. Mississippi Law Journal, 2012. Retrieved from http://ssrn.com/abstract=1998315.
  21. Evangelopoulos, N., Ashton, T., Winson-Geideman, K., & Roulac, S. (2015). Latent Semantic Analysis and Real Estate Research: Methods and Applications. Journal of Real Estate Literature, 23(2), 355–380.Google Scholar
  22. Evangelopoulos, N., Zhang, X., & Prybutok, V. R. (2012). Latent semantic analysis: five methodological recommendations. European Journal of Information Systems, 21(1), 70–86.CrossRefGoogle Scholar
  23. Fabris, C. (2015, May 6). Another use for Yik Yak on campus? Cheating on exams. The Chronicle of Higher Education. Retrieved from http://chronicle.com/blogs/wiredcampus/another-use-for-yik-yak-on-campus-cheating-on-exams/56543
  24. Fischer, L., Hilton, J., III, Robinson, T. J., & Wiley, D. A. (2015). A multi-institutional study of the impact of open textbook adoption on the learning outcomes of post-secondary students. Journal of Computing in Higher Education, 27(3), 159–172.CrossRefGoogle Scholar
  25. Georgina, D. A., & Hosford, C. C. (2009). Higher education faculty perceptions on technology integration and training. Teaching and Teacher Education, 25(5), 690–696.CrossRefGoogle Scholar
  26. Gikas, J., & Grant, M. M. (2013). Mobile computing devices in higher education: Student perspectives on learning with cellphones, smartphones & social media. The Internet and Higher Education, 19, 18–26.CrossRefGoogle Scholar
  27. Giordano, C., & Giordano, C. (2011). Health professions students’ use of social media. Journal of Allied Health, 40(2), 78–81.Google Scholar
  28. Glendinning, I. (2014). Responses to student plagiarism in higher education across Europe. International Journal for Educational Integrity, 10(1), 4–20.Google Scholar
  29. Graham, M. (2014). Social media as a tool for increased student participation and engagement outside the classroom in higher education. Journal of Perspectives in Applied Academic Practice, 2(3), 16–24.CrossRefGoogle Scholar
  30. Grusin, R. (2015, June 2). First amendment intimidation by UW-Milwaukee administration. Ragman’s Circles. Retrieved from https://ragmanscircles.wordpress.com/2015/06/02/first-amendment-intimidation-by-uw-milwaukee-administration/
  31. Johnson, B. G., & Woelfel, S. (2015, November 10). Protests on Carnahan Quad provide opportunity for first amendment education. School of Journalism, University of Missouri. Retrieved from http://journalism.missouri.edu/2015/11/protests-on-carnahan-quad-provide-opportunity-for-first-amendment-education/
  32. Joosten, T. (2012). Social media for educators. San Francisco, CA: Jossey Bass.Google Scholar
  33. Joosten, T., Pasquini, L. A., & Harness, L. (2013). Guiding social media at our institutions. Planning for Higher Education, 41(2), 1–11.Google Scholar
  34. Jouvenal, J., & Shapiro, T. R. (2015, May 6). Feminists at Mary Washington say they were threatened on Yik Yak. The Washington Post. Retrieved from http://www.washingtonpost.com/local/crime/feminists-at-mary-washington-say-they-were-threatened-on-yik-yak/2015/05/06/3d8d287a-f34a-11e4-b2f3-af5479e6bbdd_story.html
  35. Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1), 59–68.CrossRefGoogle Scholar
  36. Kear, K., Chetwynd, F., & Jefferis, H. (2014). Social presence in online learning communities: the role of personal profiles. Research in Learning Technology, 22, 19710.CrossRefGoogle Scholar
  37. Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54(3), 241–251.CrossRefGoogle Scholar
  38. Kim, J. (2015, May 4). Effective social media practices and good online teaching. Inside Higher Ed. Retrieved from https://www.insidehighered.com/blogs/technology-and-learning/effective-social-media-practices-and-good-online-teaching
  39. Kind, T., Genrich, G., Sodhi, A., & Chretien, K. C. (2010). Social media policies at US medical schools. Medical Education Online, 15, 5324.CrossRefGoogle Scholar
  40. Kingkade, T. (2015, May 14). Kennesaw State student told that waiting for and advisor is ‘harassing.’ Huffington Post. Retrieved from http://www.huffingtonpost.com/2015/05/14/kennesaw-state-advisor-its-bigger-than-ksu_n_7284748.html
  41. Kintsch, W., & Mangalath, P. (2011). The construction of meaning. Topics in Cognitive Science, 3(2), 346–370.CrossRefGoogle Scholar
  42. Kramer, A. D. I., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Psychological and Cognitive Sciences, 111(24), 8788–8790.Google Scholar
  43. Kulkarni, S., Apte, U., & Evangelopoulos, N. (2014). The use of latent semantic analysis in operations management research. Decision Sciences, 45(5), 971–994.CrossRefGoogle Scholar
  44. Landauer, T. K. (2014). LSA as a theory of meaning. In T. K. Landauer & D. S. McNamara (Eds.), Handbook of latent semantic analysis (pp. 3–34). Sussex, UK: Routledge/Psychology Press, Re-Print Edition. (Originally published in 2007 with Mahwah, NJ: Lawrence Erlbaum).Google Scholar
  45. Lasorsa, D. L., Lewis, S. C., & Holton, A. E. (2012). Normalizing Twitter: Journalism practice in an emerging communication space. Journalism Studies, 13(1), 19–36.CrossRefGoogle Scholar
  46. Li, Y., & Joshi, K. D. (2012). The state of social computing research: A literature review and synthesis using the latent semantic analysis approach. Paper presented at the Americas Conference of Information Systems, Seattle, WA, August 2012.Google Scholar
  47. Logan, B. (2015, November 10). Mizzou issued a campus-wide alert after reports of threats and unrest on campus. Business Insider. Retrieved from http://www.businessinsider.com/mizzou-social-media-threats-2015-11
  48. Luker, J. M. (2015). Perceptions of cyberbullying within higher education. (Doctoral dissertation). Retrieved from http://digitalcommons.hamline.edu/hse_all/113
  49. Mackey, R. (2014, September 12). Professor’s angry tweets on Gaza cost him a job. The New York Times. Retrieved from http://www.nytimes.com/2014/09/13/world/middleeast/professors-angry-tweets-on-gaza-cost-him-a-job.html?_r=1
  50. Mahler, J. (2015, March 8). Who spewed that abuse? Anonymous Yik Yak isn’t telling. The New York Times. Retrieved from http://www.nytimes.com/2015/03/09/technology/popular-yik-yak-app-confers-anonymity-and-delivers-abuse.html?_r=0
  51. Margo, M. J. (2012). A review of social media use in e-government. Administrative Sciences, 2(2), 148–161.Google Scholar
  52. Martellaro, A. (2015, November 12). Arrest made after social media threats at Mizzou. KSDK. Retrieved from http://www.ksdk.com/story/news/education/2015/11/11/arrest-made-after-social-media-threats-at-mizzou/75563990/
  53. Mastrodicasa, J., & Metellus, P. (2013). The impact of social media on college students. Journal of College and Character, 14(1), 21–30.CrossRefGoogle Scholar
  54. McNeill, T. (2012). “Don’t affect the share price”: social media policy in higher education as reputation management. Research in Learning Technology, 20, 152–162.Google Scholar
  55. Mergel, I., Mugar, G., & Jarrahi, M. H. (2012, February). Forming and norming social media adoption in the corporate sector. Paper presented at Association for Computing Machinery (ACM) iConference, Berlin, Germany.Google Scholar
  56. Minitab, I. N. C. (2000). Minitab user’s guide 2: data analysis and quality tools, release 13 for Windows. Minitab Inc.Google Scholar
  57. Moran, M., Seaman, J., & Tinti-Kane, H. (2011). Teaching, learning, and sharing: How today’s higher education faculty use social media. Babson Survey Research Group. Retrieved from http://files.eric.ed.gov/fulltext/ED535130.pdf
  58. Noy, N. F., & McGuinness, D. L. (2001). Ontology development 101: A guide to creating your first ontology. Retrieved from http://liris.cnrs.fr/~amille/enseignements/Ecole_Centrale/What%20is%20an%20ontology%20and%20why%20we%20need%20it.htm
  59. Pasquini, L. A. (2016). Social media policy document database. Figshare. doi:10.6084/m9.figshare.4003401.Google Scholar
  60. Pasquini, L. A., & Evangelopoulos, N. (2015, July). Organizational identity, meaning, and values: analysis of social media guideline and policy documents. In Proceedings of the 2015 international conference on social media & society (p. 6). ACM.Google Scholar
  61. Perrino, N. (2015, April 9). Colleges rush to violate free speech, due process in response to speech controversies. The Fire. Retrieved from https://www.thefire.org/colleges-rush-to-violate-free-speech-due-process-rights-in-response-to-offensive-speech/
  62. Puri, R. (2014, November 11). The guide to tightening your social media security. The Next Web. Retrieved from http://thenextweb.com/socialforbusiness/2014/11/11/tightening-social-media-security/
  63. Roblyer, M. D., McDaniel, M., Webb, M., Herman, J., & Witty, J. V. (2010). Findings on Facebook in higher education: A comparison of college faculty and student uses and perceptions of social networking sites. The Internet and Higher Education, 13(3), 134–140.CrossRefGoogle Scholar
  64. Rodriguez, J. E. (2011). Social media use in higher education: Key areas to consider for educators. Journal of Online Learning and Teaching, 7(4). Retrieved from http://jolt.merlot.org/vol7no4/rodriguez_1211.htm
  65. Ruud, C. M. (2013). College student social networking an its relationship to perceived social support. Unpublished doctoral dissertation, University of Illinois at Urbana-Champaign, 2013.Google Scholar
  66. Sanderson, J. (2011). To tweet or not to tweet: Exploring Division I athletic departments’ social-media policies. International Journal of Sport Communication, 4(4), 492–513.CrossRefGoogle Scholar
  67. Sandvig, C. (2015, May 8). What Facebook’s ‘it’s not our fault’ study really means. Wired. Retrieved from http://www.wired.com/2015/05/facebook-not-fault-study/
  68. SAS, (2016). SAS® OnDemand for Academics. Retrieved from http://support.sas.com/software/products/ondemand-academics/
  69. Sawyer, S., & Jarrahi, M. H. (2014). Sociotechnical approaches to the study of Information Systems. In A. Tucker & H. Topi (Eds.), Computing handbook, 3rd Edition: Information systems and information technology (pp. 1–5). Boca Raton, FL: CRC Press.Google Scholar
  70. Schroeder, A., Minocha, S., & Schneider, C. (2010). The strengths, weaknesses, opportunities and threats of using social software in higher and further education teaching and learning. Journal of Computer Assisted learning, 26(3), 159–174.CrossRefGoogle Scholar
  71. Scott, P. R., & Jacka, J. M. (2011). Auditing social media: A governance and risk guide. Hoboken, NJ: Wiley.Google Scholar
  72. Seaman, J., & Tinti-Kane, H. (2013). Social media for teaching and learning. Pearson Learning Solutions and the Babson Survey Research Group. Retrieved from http://www.pearsonlearningsolutions.com/assets/downloads/reports/social-media-for-teaching-and-learning-2013-report.pdf#view=FitH,0
  73. Selkie, E. (2015, March 23). Cyberbullying: A virtual menace takes its toll on college students. The Conversation. Retrieved from http://theconversation.com/cyberbullying-a-virtual-menace-takes-its-toll-on-college-students-38357
  74. Sidorova, A., Evangelopoulos, N., Valacich, J. S., & Ramakrishnan, T. (2008). Uncovering the intellectual core of the information systems discipline. MIS Quarterly, 32(3), 467–482 & A1–A20.Google Scholar
  75. Snyder, B. (2014, May 22). Universities want broader regulation of their communities’ social media. Fortune. Retrieved from http://fortune.com/2014/05/22/universities-want-broader-regulation-of-their-communities-social-media/
  76. Stewart, B. (2015). Open to influence: What counts as academic influence in scholarly networked Twitter participation. Learning, Media, and Technology, 40(3), 1–23.CrossRefGoogle Scholar
  77. Tatro v. University of Minnesota, 800 N.W.2d 811 (Mich. Ct. App. 2011).Google Scholar
  78. Tess, P. A. (2013). The role of social media in higher education classes (real and virtual)—A literature review. Computers in Human Behavior, 29(5), A60–A68.CrossRefGoogle Scholar
  79. Thomason, A. (2015, March 24). NASPA’s annual conference was going well then Yik Yak showed up. The Chronicle of Higher Education. Retrieved from http://chronicle.com/blogs/ticker/naspas-annual-conference-was-going-well-then-yik-yak-showed-up/96089
  80. Treem, J. W., & Leonardi, P. M. (2012). Social media use in organizations: Exploring the affordances of visibility, editability, persistence, and association. Communication Yearbook, 36, 143–189.Google Scholar
  81. Uversity. (2013). The social admissions report. Retrieved from http://www.uversity.com/downloads/research/social-admissions-report.pdf
  82. Veletsianos, G. (2012). Higher education scholars’ participation and practices on Twitter. Journal of Computer Assisted learning, 28(4), 336–349.CrossRefGoogle Scholar
  83. Veletsianos, G., & Kimmons, R. (2013). Scholars and faculty members’ lived experiences in online social networks. The Internet and Higher Education, 16, 43–50.CrossRefGoogle Scholar
  84. Visinescu, L., & Evangelopoulos, N. (2014). Orthogonal rotations in latent semantic analysis: An empirical study. Decision Support Systems, 62, 131–143.CrossRefGoogle Scholar
  85. Wenger, E. (1999). Communities of practice: Learning, meaning and identity (Vol. Paperback). Cambridge, UK: Cambridge University Press.Google Scholar
  86. Wenger, E., White, N., & Smith, J. D. (2009). Digital habitats: Stewarding technology for communities. Portland, OR: CPSquare.Google Scholar
  87. Wheeler, S. (2009). Learning space mashups: Combining web 2.0 tools to create collaborative and reflective learning spaces. Future Internet, 1(1), 3–13. doi:10.3390/fi1010003.CrossRefGoogle Scholar
  88. Yuan, L., & Powell, S. (2013, March). MOOCs and open education: Implications for higher education. JISC CETIS. Retrieved from http://publications.cetis.org.uk/2013/667
  89. Zheng, B., Niiya, M., & Warschauer, M. (2015). Wikis and collaborative learning in higher education. Technology, Pedagogy and Education, 24(3), 357–374.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Learning Technologies, College of InformationUniversity of North TexasDentonUSA
  2. 2.Information Technology and Decision Sciences, College of BusinessUniversity of North TexasDentonUSA

Personalised recommendations