digital identity

Should you friend your students? The short answer is no

Earlier this year I delivered a further cyberbullying guidance document on behalf of Childnet International for the UK Government's Department for Children, Schools and Families. The Guidance follows up (and designed to compliment) cyberbullying guidance, a comprehensive document  that formed part of the Safe To Learn: Embedding anti-bullying work in schools suite of advice. While the initial document was really well received both within the UK & internationally, teachers unions and associations were increasingly being asked to deal with school employee cyberbullying cases – in which the staff member was the person being victimised. I welcomed the opportunity to produce further guidance which would both support employees in term of basic digital literacy information and encourage employers to meet their statutory obligations. The document set out, ambitiously, to encourage policy and procedure be put in place for preventing and dealing with cyberbullying as a whole school community issue – which includes meeting and recognising the specific needs, rights and responsibilities of employees. In no other area of harassment would it be acceptable for an employee to be expected to deal with cases that rose within the work place on their own – yet the reports from school staff included cases where cyberbullying was not taken seriously or understood, and where they had been expected to sort out situations for themselves.

Cyberbullying: Supporting School Staff (PDF) was released in April this year (Google doc version here).  I've been talking about the document a lot recently, and I want to just explore in a little more detail the thinking behind the advice given to school employees regarding friending students in social networking services. The actual text is (with my emphasis):

‘Friending’ refers to the act of giving contacts permission to view information or contact you within web-based services. The terminology will vary from service to service – ‘Friends’ may be called contacts or connections, for example. Most social sites enable you to give different levels of access and set privacy levels on your own content and activity. These functions will vary from service to service but typically include:
•     Information that is only available to the account holder
•     Information that is accessible by contacts on the account
holder’s approved list, and
•     Information that is made publicly available, either within
the service or across the whole of the internet.

‘Friends’ does not necessarily refer in this case to people who are your actual friends, although you may choose to restrict your connections to that. ’Friends’ in this context may also be work colleagues, family members, and people that you have met online.

If you have a social networking account, do not friend pupils or add them to your contact lists. You may be giving them access to personal information and allowing them to contact you inappropriately. They may also be giving you access to their personal information and activities

So the text above outlines three basic levels of permissions granularity that can be found on most sites, gives a definition of friending, and very explicitly says don't friend pupils. This is explicitly prescriptive advice, based on the case studies reviewed during the document negotiations, and an implicit understanding that the school staff accounts referred to are either personal, or contain elements of personal activity (I previously posted on a definition of three basic online identities, characterised as personal, professional, and organisational).

The approach taken then – don't friend pupils – reflects the kind of boundaries between staff and learners that we'd expect to see in offline behavior. You wouldn't expect a teacher to give a school aged pupil their home phone number, show them pictures of their friends or regale them with the weekends social exploits. Obviously friending isn't the only issue here – managing publicly available information so that you are comfortable with what co-workers, learners and employers can access about you is also addressed in the document. The research and anecdotal evidence indicates that we operate within social network services as if we were in a closed, private world. This isn't naive – I think it's a necessary fiction which makes social networking services human spaces. The do not friend advice is there to reinforce the message that private online is typically back of a post-card private, especially if we are within environments where we're not entirely sure who has permission to see what (*cough*Facebook*cough). It also reflects the leakiness of our online identities, the way in which the personal is often hand in hand with the professional.

What the advice isn't trying to do is to put anyone off evaluating social networking services to see if they could support learning & teaching effectively. The advice goes on to state:

If you want to use web-based social networking sites for a class or for the whole school, use a service that doesn’t give contacts access to personal information and updates, or allows collaboration without requiring permissions.

Alternatively ask pupils to create new, work-focused accounts for themselves, and run them as they would an online portfolio or CV.

You can find more information and advice about Social Network Services at www.digizen.org/socialnetworking.

ThoughtFest 09

Last week I was fortunate to be one of the attendees at the fantastic Thought Fest 2009 conference, held at the University of Salford’s Think Lab. Organised by organized by Pontydysgu with the support of the JISC Evolve network and the European Mature-IP project, the event attracted top class learning technology researchers and practitioners from across Europe. Potential attendees pitched for place prior to the event, submitting their ideas for outline sessions – Dave White from Oxford University & I formed a digital literacy tag team and were lucky enough to snaffle two of the highly prized places.

About 30 delegates (most of whom are on Twitter) attended the two day event designed to bring together researchers in Technology Enhanced Learning in an open forum to debate the current issues surrounding educational technologies. Within a semi-structured (and pretty mobile) framework that was negotiated by delegates, we particularly focused on theory into practice: how and where research impacts on practice and where practice drives research.

The whole event was excellent, but I’ll share some of my highlights.

Our (the red) team came a respectable third in the diabolically evil ViolaQuest, which was masterminded by Nicola Whitton and Rosie Jones, a couple of the UK’s leading Alternative Reality Game (ARG) researchers and designers. The game involved unraveling mainly geographic and environmental clues. They also managed to include the Emerge bearded lady meme:

Josie beard
 
Photo credit: Rozberry redteam

There were some great show and discuss sessions, including Maria Perifanou on using Wikiquests in language Learning, Pat Parslow on Digital ID & Kathrin Kaufhold on the Awesome project.

I missed out on Jen Hughes’s digital cartoon workshop, taking part instead in the podcasting workshop led by Andreas Auwärter. Dave & I picked the travelogue assignment, and produced a gonzo journalism piece on The Salford Lift Experience, inspired in part by out experience of the Maxwell Building lifts. Unfortunately, half of this masterpiece was lost to the random gods of audio, so the world will never hear Dave’s very informative description of the up and down buttons, nor believe there was a student who felt the lift experience in Salford had drastically improved over the last two years, various other lift based interviews or the toilet on the stairwell incident. For those of you who can be bothered, the last part is here:

Listen to The Salford Lift Experience
(mp3)

There were some excellent recordings produced on the day, notably a advert for online identity management cleaning services, which I’ll link to as soon as they go up.

The award for most awesome presentation has to go however to the SAPO campus team, who will be rolling out the worlds first institution wide supported PLE this September. You can see their presentation slides here. Basically, The University of Aveiro are moving away from the managed learning system model and providing a supported Personal Learning Environment (PLE) service linking in University functionality with member selected and supported web 2.0 distributed activity. Why is this amazing? The global edtech community have been talking about how institutions can engage with learner-centered PLEs for a while now, but Aveiro and the SAPO team are putting it into practice. Campus wide. In September. You can find out more and ask questions over at the Though Fest site.

Sapo campus

The problem with the mother

Protection

Link love: This post builds on the case study I contributed to the Eduserv workshop on Digital Identities at the British Library today. Everyone's case studies are lodged over at the Pattern Language Network site, along with Yishay's Slidedeck pattern language tutorial on writing a case study. It also moves forward some observations I made in my post Pictures of Children Online a couple of years ago.

From the workshop intro:

"We use the term ‘digital identity’ to refer to the online
representation of an individual within a community, as adopted by that
individual and projected by others. An individual may have multiple
digital identities in multiple communities.

Eduserv have recently funded three projects on digital identity as
a result of our 2008 grants call. This workshop will help the projects
gather case-studies about the ways in which digital identity is
currently manifest in UK higher education.

This event is aimed at people who have an interest in the issues
around digital identity in higher education including employers, HR
staff, careers guidance staff, standards experts, students and
academics.

Prior to the workshop we will be collecting a series of “stories”
about digital identity from people attending the event. On the day, we
will be working in groups to discuss and add to the series. Following
this, we will analyse the stories in order to find reoccurring themes
or patterns."

The group I worked with looked at two case studies, my own and Controlling Flickr Contacts, from Margarita Perez Garcia

Case Study: other people's identities

Summary:   
This study looks at issues of parental responsibility & identity disavowal
Created 08 Jan 2009 by Josie Fraser
 
Situation:
What was the setting in which this case study occurred?

Like most people working in the field of social media, I have a purposefully easy to find online presence. I belong to multiple social networks, for work, for research, and for experience. The social networks (& I’m using a broad definition here, as outlined in http://www.digizen.org/socialnetworking/ )  I use most frequently are typically those that I can also most easily repurpose and use to maintain a constantly updated pubic presence – Twitter, Fickr, my own blogs, Delicious. Probably more importantly though, they are also the ones that allow me to socialise, discuss, hang out and meet new people. I started using the internet about 12 years ago to socialise, prompted by the physical limitations of being a single mother, of being broke all the time and not having a social or family network. For me the experience of being online was an extremely positive and liberating one, & remains so.

Task:
What was the problem to be solved, or the intended effect?

The primary issue was wanting to protect my son from harm, in the broadest sense, and to act respectfully towards him.

I am used to belonging to self-determined communities of people who I like and respect, who I often know exclusively or primarily online. It might seem like an obvious extension of my friendship and relationship building to share stories and pictures of my son, and to model a sense of my everyday experience – which heavily features the joys and logistics of motherhood -online.

However, there are several reasons why I don’t do this. Firstly, there’s thorny the issue of consent, and how my son negotiates and understands this at different points I his life.

There are also ethical, or just straightforwardly thoughtful, considerations. My mum has a particularly embarrassing picture of me that haunted the whole of my childhood. As an adult, I’m ok with it (no, really). Thankfully my mum was mostly sensitive about my particular loathing of this picture and didn’t get it out at every available opportunity – if she’d have put it online I can imagine I would have been mortified. Maybe not at the time she put it up, but certainly a few years down the line, and especially if anyone from my school had come across it.

There's also the issue of digital presence. Is it up to us to contribute to our children’s digital presence? Would you have liked your parents contributing to what searches of you might return? Perhaps by now I would have loved that embarrassing picture of myself – maybe it would have come to mean something entirely different to me. But at different points in my life it certainly wouldn’t have been at all welcome.

The other obvious issues are internet related child abuse and bullying. I’m very much against a moral-panic approach to using technology, and I also think it’s very important that we evaluate and regard risks appropriately. While the vast majority of child abuse takes place entirely offline, and is typically perpetrated by the victims family or immediate circle, that’s also no reason to dismiss the chances of a child or young person we know coming into contact with someone who could harm them. We take steps to educate them about a range of strategies they can use to look out for themselves in their offline and online dealings. In the same way, we need to model good practice ourselves.

Another reason for ‘protecting’ my son and not talking about being a mother was linked to financial insecurity. My career is on the way to being well established, and I’ve proven that I can manage to raise a child ‘alone’ (I moved closer to my mum and sister, so I have the luxury of a support network now) and so it worries me less that people might judge me and choose not to employ me because of my status as a single mother.

Actions:
What was done to fulfil the task?

Initially, I kept all pictures of my son strictly within private, friends or family only permissions on Flickr. This has changed – I have a couple of pictures of my son as a small child in public. I’m similarly careful about the rest of my young family members too – I posted a picture of my  then 14 year old niece last year only to have it immediately favourited by a complete pervert. I removed the picture from public view, and blocked the pervy guy.

Similarly I don’t really talk about being a mother, although I’ve noticed this changing as my son becomes more independent himself.

Basically, I negated any public online identity that explicitly represented me as a mother for a long time.

Results:
What happened? Was is a success? What contributed to the outcomes?
    
Yes, it worked very well, since I have been consistent and systematic , had clearly defined rules about representing my son which I’ve stuck too. However, my son is getting older, his and my identities are both significantly shifting, and I’m wondering about ‘not having been a mother’. Was it just a handy tactic, or was it a cowardly disavowal of parenthood?  Is ‘being a mother’ in this sense important? For me, or for others?

Lessons Learned:
What did you learn from the experience?

Protecting your children online is actually really easy; watch out for the political speculation.

As we worked through stories to patterns, a very strange thing happened – the role of motherhood disappeared. And this was very clearly another compromise on behalf of the child – in order to demonstrate the meta pattern/problem concerning the protection of the child, we had to make the troublesome issue of the mother go away. The problem of the mother turned out to be that she was the mother. The problem wasn't one that could be solved outside the context of wide spread social and political change. So our title became Others First Managing the tensions between identity & personal responsibility, where identity is enmeshed and shaped by, in this explicit case, the vulnerable other of the child. From this it's possible to extrapolate the pattern on to a broader context – for example, anyone who needs to manage their own or another's online identity or personal safety. If we had more time we could have extended the pattern to look at different kinds of identity management – for example the management of being gay within a homophobic society, the management of responsible friendship etc.

What really struck me today was how the solution to effective protection – that could be interperated as concealment, repression, or confinement to specific circles, mirrors and perpetuates existing social inequalities – making already under represented and less visible groups – namely children and mothers in this case, though I'd argue the same strategy can be applied to a lot of other troublesome identities/bodies – as shadowy in online public spaces as they are off line.