Advertisement

Staying Professional and Safe

  • Franziska TredeEmail author
  • Lina Markauskaite
  • Celina McEwen
  • Susie Macfarlane
Chapter
Part of the Understanding Teaching-Learning Practice book series (UTLP)

Abstract

One of the many purposes of workplace learning (WPL) is for students to socialise into their future professional roles. Learning to think and act like a professional includes not only working in physical workplaces, but also in digital and mobile spaces. With the mobility afforded by connected devices such as smartphones, tablets and laptops, virtual spaces have blurred the boundaries between personal, public, learning, organisational and professional spheres. This blurring offers new possibilities to learn knowledge, skills and experiences, but also presents some potential hazards, such as students engaging in inappropriate professional conduct, or placing themselves, other employees, clients and/or the host organisation’s reputations at risk. To avoid these potential risks and make the most of these new possibilities requires developing students’ capacity to use mobile technology safely, confidentially and professionally. This chapter explores how to support the development of these capabilities, and maintain the privacy, confidentiality, safety and security of all involved.

References

  1. Allen, M. (2012). An education in Facebook. Digital Culture and Education, 4, 213–225.Google Scholar
  2. Australian Government. (2012). Privacy amendment (enhancing privacy protection) Act 2012. Retrieved December 13, 2018, from https://www.legislation.gov.au/Details/C2012A00197.
  3. Barlow, C., Morrison, S., Stephens, H., Jenkins, E., Bailey, M. J., & Pilcher, M. (2015). Unprofessional behaviour on social media by medical students. Medical Journal of Australia, 11, 439–446.CrossRefGoogle Scholar
  4. Bechmann, A., & Lomborg, S. (2012). Mapping actor roles in social media: Different perspectives on value creation in theories of used participation. New Media & Society, 15(5), 765–781.CrossRefGoogle Scholar
  5. Børsen Hansen, S. (2018). Assessing network technologies for learning. In N. B. Dohn (Ed.), Designing for learning in a networked world (pp. 64–78). London: Routledge.Google Scholar
  6. Carter, C. M., Martin, L., & O’Malley, C. (2014). Understanding the social media ecologies of employees within higher education institutions: A UK-based case study. In M. Kent & T. Leaver (Eds.), An education in Facebook? Higher education and the world’s largest social network (pp. 217–226). New York: Routledge.Google Scholar
  7. Chretien, K., Goldman, E., Beckman, L., & Kind, T. (2010). It’s your own risk: Medical students’ perspectives on online professionalism. Academic Medicine, 85, 68–71.CrossRefGoogle Scholar
  8. Cook, J. (2010). Mobile phones as mediating tools within augmented contexts for development. International Journal of Mobile and Blended Learning, 2(3), 1–12. http://doi.org/10.4018/jmbl.2010070101.CrossRefGoogle Scholar
  9. Cook, J., Pachler, N., & Bachmair, B. (2011). Ubiquitous mobility with mobile phone: A cultural ecology for mobile learning. E-Learning and Digital Media, 8(3). Retrieved from http://journals.sagepub.com/doi/pdf/10.2304/elea.2011.8.3.181.
  10. Drachsler, H., & Greller, W. (2016). Privacy and analytics—it’s a DELICATE issue. A checklist to establish trusted learning analytics. In 6th Learning Analytics and Knowledge Conference, April 25–29, Edinburgh, UK.Google Scholar
  11. Eraut, M. (1994). Developing professional knowledge and competence. London: Falmer Press.Google Scholar
  12. Freidson, E. (2001). Professionalism: The third logic. London: Polity Press.Google Scholar
  13. Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.CrossRefGoogle Scholar
  14. Giddens, A. (1991). Modernity and self-identity. Stanford, CA: Stanford University Press.Google Scholar
  15. Gough, K., Harte, D., & Jackson, V. (2014). “I think it’s mad sometimes”-Unveiling attitudes to identity creation and network building by media studies students on Facebook. In M. Kent & T. Leaver (Eds.), An education in Facebook? Higher education and the world’s largest social network (pp. 132–141). New York: Routledge.Google Scholar
  16. Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54(3), 241–251.CrossRefGoogle Scholar
  17. Kreber, C. (2016). Educating for civic-mindedness: Nurturing authentic professional identities through transformative higher education. London: Routledge.CrossRefGoogle Scholar
  18. Marwick, A. E., & boyd, d. (2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1), 114–133.Google Scholar
  19. Orlikowski, W. J. (2000). Using technology and continuing structures: A practice lens for studying technology in organisations. Organization Science, 11(4), 404–428.CrossRefGoogle Scholar
  20. Papacharissi, Z. A. (2010). A private sphere: Democracy in a digital age. Malden, MA: Polity.Google Scholar
  21. Raynes-Goldie, K., & Lloyd, C. (2014). Unfriending Facebook? Challenges from an educator’s perspective. In M. Kent & T. Leaver (Eds.), An education in Facebook? Higher education and the world’s largest social network (pp. 153–161). New York: Routledge.Google Scholar
  22. General Data Protection Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC; https://www.eugdpr.org/.Google Scholar
  23. Ribble, M. (2015). Digital citizenship in schools: Nine elements all students should know (3rd ed.). International Society for Technology in Education.Google Scholar
  24. Roll, I., & Winne, P. (2015). Understanding, evaluating and supporting self-regulated learning using learning analytics. Journal of Learning Analytics, 2(1), 7–12.CrossRefGoogle Scholar
  25. Stephens, K., Zhu, Y., Harrison, M., Iyer, M., Hairston, T., & Luk, J. (2017). Bring your own mobile device (BYOD) to the hospital: Layered boundary barriers and divergent boundary management strategies. In Proceedings of the 50th Hawaii International Conference on System Sciences, Hawaii (pp. 3517–3526).Google Scholar
  26. Trede, F., Goodyear, P., Macfarlane, S., Markauskaite, L., McEwen, C., & Tayebjee, F. (2016a). Enhancing workplace learning through mobile technology: Barriers and opportunities to the use of mobile devices on placement in the healthcare and education fields. In L. E. Dyson, W. Ng, & J. Fergusson (Eds.), Mobile learning futures: Sustaining quality research and practice in mobile learning. Paper presented at the 15th World Conference on Mobile and Contextual Learning, mLearn, Sydney, NSW October 24–26 (pp. 250–260).Google Scholar
  27. Trede, F., Goodyear, P., Macfarlane, S., Markauskaite, L., Tayebjee, F., & McEwen, C. (2016b). Using mobile technology professionally and safely. Charles Sturt University, The University of Sydney, Deakin University, and Western Sydney University, for the Commonwealth Government Office for Learning and Teaching. Retrieved from https://wpltech.wordpress.com/about/framework/resources/professional-and-safe/.
  28. Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. New York: Basic Books.Google Scholar
  29. Van der Laan, J. M. (2016). Narratives of technology. New York: Palgrave Macmillan.Google Scholar
  30. Watters, A. (2014, August 5). Protecting student privacy through more transparency. [Blog post]. Retrieved from https://modernlearners.com/protecting-student-privacy-through-more-transparency/.
  31. Watters, A. (2016, December 17). Education technology and data insecurity [Blog post]. Retrieved from http://hackeducation.com/2016/12/17/top-ed-tech-trends-infosec.
  32. Wear, D., & Kuczewski, M. G. (2004). The professionalism movement: Can we pause? American Journal of Bioethics, 4(2), 1–10.CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Franziska Trede
    • 1
    Email author
  • Lina Markauskaite
    • 2
  • Celina McEwen
    • 1
  • Susie Macfarlane
    • 3
  1. 1.University of Technology SydneyUltimoAustralia
  2. 2.The University of SydneySydneyAustralia
  3. 3.Deakin UniversityBurwood, MelbourneAustralia

Personalised recommendations