Staying Professional and Safe
One of the many purposes of workplace learning (WPL) is for students to socialise into their future professional roles. Learning to think and act like a professional includes not only working in physical workplaces, but also in digital and mobile spaces. With the mobility afforded by connected devices such as smartphones, tablets and laptops, virtual spaces have blurred the boundaries between personal, public, learning, organisational and professional spheres. This blurring offers new possibilities to learn knowledge, skills and experiences, but also presents some potential hazards, such as students engaging in inappropriate professional conduct, or placing themselves, other employees, clients and/or the host organisation’s reputations at risk. To avoid these potential risks and make the most of these new possibilities requires developing students’ capacity to use mobile technology safely, confidentially and professionally. This chapter explores how to support the development of these capabilities, and maintain the privacy, confidentiality, safety and security of all involved.
- Allen, M. (2012). An education in Facebook. Digital Culture and Education, 4, 213–225.Google Scholar
- Australian Government. (2012). Privacy amendment (enhancing privacy protection) Act 2012. Retrieved December 13, 2018, from https://www.legislation.gov.au/Details/C2012A00197.
- Børsen Hansen, S. (2018). Assessing network technologies for learning. In N. B. Dohn (Ed.), Designing for learning in a networked world (pp. 64–78). London: Routledge.Google Scholar
- Carter, C. M., Martin, L., & O’Malley, C. (2014). Understanding the social media ecologies of employees within higher education institutions: A UK-based case study. In M. Kent & T. Leaver (Eds.), An education in Facebook? Higher education and the world’s largest social network (pp. 217–226). New York: Routledge.Google Scholar
- Cifas. (2016). Fraudscape 2016. Retrieved from https://www.cifas.org.uk/secure/contentPORT/uploads/documents/160706_cifas_fraudscape_ONLINE.pdf.
- Cook, J., Pachler, N., & Bachmair, B. (2011). Ubiquitous mobility with mobile phone: A cultural ecology for mobile learning. E-Learning and Digital Media, 8(3). Retrieved from http://journals.sagepub.com/doi/pdf/10.2304/elea.2011.8.3.181.
- Drachsler, H., & Greller, W. (2016). Privacy and analytics—it’s a DELICATE issue. A checklist to establish trusted learning analytics. In 6th Learning Analytics and Knowledge Conference, April 25–29, Edinburgh, UK.Google Scholar
- Eraut, M. (1994). Developing professional knowledge and competence. London: Falmer Press.Google Scholar
- Freidson, E. (2001). Professionalism: The third logic. London: Polity Press.Google Scholar
- Giddens, A. (1991). Modernity and self-identity. Stanford, CA: Stanford University Press.Google Scholar
- Gough, K., Harte, D., & Jackson, V. (2014). “I think it’s mad sometimes”-Unveiling attitudes to identity creation and network building by media studies students on Facebook. In M. Kent & T. Leaver (Eds.), An education in Facebook? Higher education and the world’s largest social network (pp. 132–141). New York: Routledge.Google Scholar
- Marwick, A. E., & boyd, d. (2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1), 114–133.Google Scholar
- Papacharissi, Z. A. (2010). A private sphere: Democracy in a digital age. Malden, MA: Polity.Google Scholar
- Raynes-Goldie, K., & Lloyd, C. (2014). Unfriending Facebook? Challenges from an educator’s perspective. In M. Kent & T. Leaver (Eds.), An education in Facebook? Higher education and the world’s largest social network (pp. 153–161). New York: Routledge.Google Scholar
- General Data Protection Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC; https://www.eugdpr.org/.Google Scholar
- Ribble, M. (2015). Digital citizenship in schools: Nine elements all students should know (3rd ed.). International Society for Technology in Education.Google Scholar
- Stephens, K., Zhu, Y., Harrison, M., Iyer, M., Hairston, T., & Luk, J. (2017). Bring your own mobile device (BYOD) to the hospital: Layered boundary barriers and divergent boundary management strategies. In Proceedings of the 50th Hawaii International Conference on System Sciences, Hawaii (pp. 3517–3526).Google Scholar
- Trede, F., Goodyear, P., Macfarlane, S., Markauskaite, L., McEwen, C., & Tayebjee, F. (2016a). Enhancing workplace learning through mobile technology: Barriers and opportunities to the use of mobile devices on placement in the healthcare and education fields. In L. E. Dyson, W. Ng, & J. Fergusson (Eds.), Mobile learning futures: Sustaining quality research and practice in mobile learning. Paper presented at the 15th World Conference on Mobile and Contextual Learning, mLearn, Sydney, NSW October 24–26 (pp. 250–260).Google Scholar
- Trede, F., Goodyear, P., Macfarlane, S., Markauskaite, L., Tayebjee, F., & McEwen, C. (2016b). Using mobile technology professionally and safely. Charles Sturt University, The University of Sydney, Deakin University, and Western Sydney University, for the Commonwealth Government Office for Learning and Teaching. Retrieved from https://wpltech.wordpress.com/about/framework/resources/professional-and-safe/.
- Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. New York: Basic Books.Google Scholar
- Van der Laan, J. M. (2016). Narratives of technology. New York: Palgrave Macmillan.Google Scholar
- Watters, A. (2014, August 5). Protecting student privacy through more transparency. [Blog post]. Retrieved from https://modernlearners.com/protecting-student-privacy-through-more-transparency/.
- Watters, A. (2016, December 17). Education technology and data insecurity [Blog post]. Retrieved from http://hackeducation.com/2016/12/17/top-ed-tech-trends-infosec.