Diversity College Founded 1865 Erin Kelley Brian Koslowski Emily Nemeth Leighanne Regan studentaffairs.com virtual case study competition 2006 Overview of Facebook Launched in February 2004 by Mark Zuckerberg, a sophomore at Harvard. Free, online profiling service for students. Undergraduate, graduate, staff and faculty with a university email address have access to Facebook. Students can request that their institution be added to the facebook.com website. Facebook needs no administrative approval to add the institution. Facebook is sponsored by outside companies who advertise on the website. Students can set up privacy settings to determine who can view their profile. Note: Few students use this setting. Students can post a wide variety of personal information about lifestyle, hobbies, contact information and pictures. Quick Facebook Facts 15,000 accounts are created everyday 9.4 million unique users log-on on every month Nearly 3/4 of Facebook users sign on at least once every 24 hours Average user signs on 6 times a day Used by over 1500 colleges and universities across the United States Nation wide Facebook tallies 250 million hits a day and ranks 9th overall in Internet traffic Zuckerberg paid 85 dollars per month to rent the server initially to keep the site running Facebook Survey at Diversity College An initial survey of 60 student leaders was done to determine the impact of Facebook on their campus. Demographics: 27 men and 33 women were surveyed 22 seniors, 17 juniors, and 21 sophomores 56 of the student leaders had a Facebook profile All but 19 identified the United States as their country of origin Findings Why students choose to participate in Facebook… To keep in touch with friends across campus, old friends from high school, and those friends on other college campuses Meet new people and find others with similar interests Learn people’s names Look at pictures See what people are involved in on campus Find birthdays Develop residence hall communities To stalk people Created profile due to peer pressure Make a large school seem small Quicker and easier way to communicate with friends and classmates Findings continued… What are some risks students identified… Privacy violations Stalking/harassment Posting inappropriate photos/information Creating a false identity Identity theft Addictive Hate crimes Source of procrastination Reasons for Developing a Tutorial for First Year Students Students usually use more than one profiling site to post information (e.g. myspace.com, livejournal.com, AIM.) Associated risks with posting personal information online like stalking, harassment, and identity theft. Frequency of use, potentially leading to Internet addiction. Diversity College students admitted using Facebook as a means of procrastination. Tutorial Structure 1) 2) 3) New students will take the online tutorial during the New Students Orientation. The tutorial is broken down into three areas: Initial Risk Assessment Questionnaire Internet Issues Exploration Section Online Safety Exam Student Instructions for Tutorial 1) 2) 3) 4) 5) Take initial risk assessment quiz. Review assessment results. Read exploration topics sections before continuing to Internet exam. Complete Internet exam. Note: You must get eight out of the ten questions correct to pass the exam. Complete evaluation emailed to you after you have completed the exam. You will now begin the Tutorial! Diversity College SAMPLE Part One Risk Assessment Questionnaire When you are online, how likely are you to do each of the following? 1. Stay up past 2am Internet surfing. Not at all likely Moderately likely Extremely likely 2. Spend over two hours a day on the Internet doing nonacademic related work. Not at all likely Moderately likely Extremely likely 3. Your logon password is one simple word. Not at all likely Moderately likely Extremely likely Diversity College SAMPLE Risk Assessment Questionnaire continued… 4. Read the privacy policy for every website I sign up to use. Not at all likely Moderately likely Extremely likely 5. Run frequent virus checks on my computer. Not at all likely Moderately likely Extremely likely 6. Safeguard myself against cyberstalking. Not at all likely Moderately likely Extremely likely 7. Used an online gambling website in the past month. Not at all likely Moderately likely Extremely likely Diversity College SAMPLE Risk Assessment Questionnaire continued… 8. Entered Internet contests operated by unfamiliar companies. Not at all likely Moderately likely Extremely likely 9. Responded to unsolicited emails. Not at all likely Moderately likely Extremely likely 10. Accept friend requests from unfamiliar people through online profiling websites such as facebook.com. Not at all likely Moderately likely Extremely likely Diversity College Your risk assessment results 5 4.5 4 3.5 Internet Safety 3 Internet Addiction 2.5 Identity Theft 2 1.5 1 0.5 0 1 Diversity College Part Two Internet Issues to Explore Internet Safety Internet Addictions Identity Theft Privacy Many individuals believe their profile and registration information will stay solely in the hands of Facebook employees. On the contrary, the Facebook privacy policy states, “We may share your information with third parties, including responsible companies with which we have a relationship.” In addition, if Facebook were to ever sell the company, they would also sell all users’ information. Facebook also reserves the right to “supplement” your profile with other information. The website states, “We use the information about you that we have collected from other sources to supplement your profile unless you specify in your privacy settings that you do not want this to be done.” Description of “other sources” is not provided. http://www.facebook.com/policy.php Privacy It is important to keep in mind that online companies often promise consumers their information will remain private unless otherwise directed by the user; however, this promise has been dishonored in the past. Toysmart, a company that promised privacy to its users, was permitted to sell its users’ personal information despite objections of 39 state attorneys general. http://www.findarticles.com/p/articles/mi_hb166/is_200203/ai_n5786010 Privacy In 2002, it was reported that 62 percent of female Internet users and 20 percent of male internet users were victims of some form of cyberstalking. Some types of cyberstalking include: direct threats, hacking, following the victim from site to site, building websites targeting the victim, posing as the victim and attacking others, and contacting victim’s family or employer. By posting personal information such as home address, phone number, school address or spring break plans, students increase their risk of becoming victims of cyberstalking. http://www.wiredsafety.org/resources/powerpoint/cyberstalking_study.ppt Tips for Your Privacy Delete cookies weekly Only provide necessary registration information Don’t post your contact information if possible Make sure to log off public computers Read the privacy statement of the website or company If you are confused about the policy statement, contact the company Online Stalking The average age range of college students is 18-22 years which leads some to believe that these are the only individuals who can use Facebook. Students find security in the fact that they are only interacting with other “college age” students. The reality, though, is Facebook permits anyone with an .edu address to use their services which would include students, college professors and staff, and alumni. As of 2002 the oldest living “worker” is a professor who is 102 while the youngest student recorded in 2005 was 10 years of age. Both individuals have an .edu account showing that a wide age group has access to Facebook. http://www.messiah.edu/news/2002/MC-081-02.html http://www.chinadaily.com.cn/english/doc/2005-06/28/content_455203.htm Online Stalking Facebook does acknowledge that it does not want anyone under the age of 13 using its services; however, the organization has no direct way of tracking this information. If the underage user is discovered, their account will be terminated. Cyberstalking is a real and serious danger considering how much information you can post on Facebook as a student. Currently, you are permitted to post your phone number, address, photograph, birthday, hometown, spring break plans and other personal information that could lead a stalker directly to your home, your school or your spring break location. Cyberstalking has been minor and extreme in nature ranging from a threatening email to murder. Tips to Protect Yourself from Online Stalking Don't respond to flaming (provocation online). Choose a genderless screen name. Don't flirt online, unless you're prepared for the consequences. This is just like real life. Yes, you have the right to flirt and you have the right to a sexy nickname, however the more obvious you are, the more likely you are to arouse unwanted attention from unwanted suitors. Save offending messages and report them to your service provider. If someone makes threats in a chat room or on a message board, notify the moderator or Web site operator right away. Don’t confront the stalker/harasser, this only arouses more anger or emotional attacks. Don't give out any personal information about yourself or anyone else link to private surfing info. Get out of a situation online that has become hostile, log off or surf elsewhere. Google yourself to make sure no personal information is posted by others about you. http://www.wiredsafety.org/cyberstalking_harassment/csh10.html Free Speech Facebook reserves the right to review the information you post and remove or delete it from your Facebook account. Facebook is permitted to decide what information qualifies as defamatory, offensive or illegal and will use the information against you if necessary in a civil suit. You can be sued for defamatory information which is any false or misleading about another individual or organization. Individual colleges also reserve the right to take action against students who post inappropriate information on the Facebook accounts. At Fisher College, a sophomore was expelled “for his online critique of a campus police officer” Students at Northern Kentucky University were charged with code violations when a keg was seen in a residence hall room picture online. In an extreme case, a University of Oklahoma student was visited by the Secret Service because of assassination references in comments regarding President Bush. http://www.facebook.com/terms.php Ebbinghouse, C. (1997). Taming the wicked, wicked net: Acceptable use and the internet. Searcher, 5(7), 1070-4795. Schweitzer, S., Globe Staff. (October, 2005). Fisher college expels student over website entries Bugeja, M. (1/23/06) Facing the Facebook. Chronicle of Higher Education Ibid. Free Speech Are these examples violations of the First Amendment? Facebook and other companies enforce these policies despite the U.S. Supreme Court ruling against the 1996 Communications Decency Act (CDA), which outlawed "indecent" communications online. In other words, the Court recognizes the Internet as a free speech zone, thus protecting it by the First Amendment. http://www.aclu.org/privacy/speech/index.html Tips to Protect Your Free Speech Know your rights! Before clicking “yes” and accepting your registration, make sure you have the Internet site’s terms of use. Be familiar with your school’s policy regarding Internet postings and your school’s code of student conduct. Be smart with what you post online because it’s public information! Your Facebook account is accessible not only to your peers, but also employers, parents and school and law enforcement officials. Make sure others are not using your screen name to post defamatory, illegal or offensive information. If you think this is happening, contact the website immediately. You may also contact school authorities. Identity Theft The common definition of identity theft is the stealing of a victim’s personal information to commit crimes such as making fraudulent charges on a credit card. 10 million people per year are victims of identity theft, and often it is at the hands of someone they know. College is a high-risk environment for identity theft, because of ready Internet access, the barrage of credit applications students receive, downloading of music and videos, and student loan information. O'Neill, B. & Xiao, J.J. (2004) Consumer practices to reduce identity theft risk: An exploratory study. Consumer Interests Annual, 50, p. 125-127. Tips to Protect Yourself from Identity Theft Read the privacy statements on websites that ask for your personal information to see who will be viewing it. Take yourself off the pre-approved for credit pipeline by calling the hotline run by the three major credit bureaus at 888-567-8688. Check your credit report for any unusual activity. Six states have mandated that free credit reports be made available to consumers, and in other states it costs only about nine dollars. You can check this by calling the three major credit bureaus: Equifax (800-6851111), Experian (888-397-3742) and TransUnion (800-88-4213). Shred “pre-approved for credit” envelopes and other items that have your identity on it. Protect your privacy and computer by purchasing antivirus, firewall and antispyware software. Visit the website created by the Department of Education on identity theft at www.ed.gov/misused. Marbaix, J.R. (2004). Lessons in Privacy. U.S. News & World Report, 137( 7), p. 74-75. Internet Addiction College students are considered to be at high-risk for problems because of ready access to the Internet and flexible time schedules. While Internet Addiction is not yet recognized by the American Psychiatric Association’s criteria book the DSM-IV, many researchers believe that addiction to the Internet does share similar symptoms with substance abuse such as tolerance, withdrawal, craving and negative life consequences. While Internet addiction in the 1990s was believed to be most common in young males, today’s research has found that it can affect a wide range of people. Usually, high Internet use is associated with emotional loneliness. Griffiths, M., Miller, H., Gillespie, T., & Sparrow, P. (1999) Internet usage and internet addiction in students and its implications for learning. Journal of Computer Assisted Learning, 15, p. 85-90. Indicators of Internet Addiction Loss of sleep due to use Not meeting obligations at school, work or in personal relationships Not being able to manage internet time well Walter, E. (1999). Idaho professors study internet junkies. Community College Week, 11(12), p. 16. Ways to Assess Your Internet Use Do you feel preoccupied with the Internet (think about previous online activity or anticipate next online session)? Do you feel the need to use the Internet with increasing amounts of time to achieve satisfaction? Have you repeatedly made unsuccessful efforts to control, cut back, or stop Internet use? Do you feel restless, moody, depressed, or irritable when attempting to cut down or stop Internet use? Do you stay online longer than originally intended? Have you jeopardized or risked the loss of a significant relationship, job, educational or career opportunity because of the Internet? Have you lied to family members, therapists, or others to conceal the extent of involvement with the Internet? Do you use the Internet as a way of escaping from problems or of relieving a dysphoric mood (e.g., feelings of helplessness, guilt, anxiety, and depression)? Young, K.S. (2004) Internet Addiction: A New Clinical Phenomenon and Its Consequences. American Behavioral Scientist, 48, p. 402-415. Part Three Internet Exam 1) How many people are victims of identity theft a year: a. 1 million b. 5 million c. 10 million d. 50 million 2) What are three indicators of Internet Addiction? a. Loss of sleep, not meeting obligations at school, work or in personal relationships, not being able to manage internet time well b. Loss of sleep, online-compulsive disorder, not being able to manage internet time well. c. Pulmonary emboli, work or in personal relationships, not being able to manage internet time well. d. Alcohol abuse, dancing, loss of sleep Internet Exam 3) What is an example of a strong password? a. L5d7# b. Destiny c. Fido d. [Your] name 4) Where can you report cyber crime? a. DC5 b. DSM-IV c. APA d. a. IC3 5) Which one of these answers will NOT help you to check your credit report? a. TransUnion b. ExportCredit c.Equifax d. Experian 6) The estimated age range of people permitted to use college Facebook is: a. 10-102 b. 18-22 c. 17-26 d. 15-57 Internet Exam 7) Facebook is permitted to share my profile information with: a. No one b. My family and friends c. Any one at my school d. Any third party with which Facebook has a relationship 8) What are three ways to avoid cyberstalking? a. Don’t give out any personal information about yourself, e.g. phone number, address, spring break plans. b. Save messages that appear threatening and offensive and give them to campus authorities/security. c. Google yourself to make sure no one is posting information about you online. d. Ignore messages that appear threatening and offensive because they will most likely go away. Internet Exam 9) In 2002, it was reported that this percentage of women and men were victims of cyberstalking: a. 62:20 respectively b. 23:5 respectively c. 56:45 respectively d. 27:45 respectively 10) Free speech is your First Amendment right, but there are limitations to this right when you are surfing Facebook. The following 3 postings can be removed by Facebook employees: a. Offensive information b. Self-defaming comments c. Illegal information d. Defamatory comments about others END OF TUTORIAL Assessment of Tutorial Online self-response survey will be sent to all students after the online exam. Ten small focus groups comprised of 8-10 first year students will occur in September 2006. Respondents will be entered into a raffle for gift certificates to the campus bookstore. Purpose of content and questions To give first year college students a broad understanding of the issues and risks associated with internet use. A wide range of literature was reviewed to view the students as both internet consumers and participants in a new collegial community. The students are required to critically assess their internet use at the beginning of the tutorial so that students can reflect on their own internet behavior through the exploration section and exam. At the end of the tutorial section, a short exam is given and students get eight out of ten questions correct in order to pass the exam. These questions were chosen to demonstrate the severity of internet risks while at the same time informing them of prevention strategies. Implications for Faculty Many faculty are forming Facebook groups such as, “Faculty Members Desperately Trying To Relate To their Students Through Technology (FMDTTRTTSTT)” to understand the format of Facebook and the exchanges between students. These faculty have posted their office hours, course load, and email addresses. These professors also respond to students’ comments that are posted on their “wall.” Students can develop a greater rapport with their professors by having a common space outside of the classroom and faculty office hours. Faculty can also use Facebook to learn about students who are in their class—i.e. large lecture classes. Implications for Residence Life Staff Some Residence Directors (RD) have discussed with their staffs the consequences of posting illegal, offensive and defamatory comments on their jobs. Facebook has been used as a source of visual identification in judicial matters, e.g. face shot. RDs have accessed Resident Assistants’ (RA) profiles on Facebook to collect trivia about them to prepare for an ice breaker at the beginning of RA training. This exercise led to a discussion around appropriate Facebook etiquette and role modeling. Facebook can be used to organize a community list serve, e.g. residence hall floors and house council staffs. This can be used to match faces to names more quickly and can be used effectively in posting upcoming events or meetings. Facebook communities such as these can also be appropriate resources for contact information. The University of Massachusetts Amherst has posted the RA job description on Facebook.com to advertise to Facebook users. Recruitment for the RA position have been modeled on the homepage for Facebook in order to appeal to millennial student interest. What did we learn? The use of Facebook and other online profiling websites incorporates many benefits, but also many risk factors associated with their use. Technology is still a very new Student Affairs issue, so more appropriate and best practices must be determined. Quantitative studies are extremely limited within the field of Student Affairs regarding students’ usage of online profiling and their developmental effects. Many recent incidents have occurred across the country in regards to online profiling prompting a necessary nation wide institutional policy changes and response to the growing phenomenon. THANK YOU! Thank you to studentaffairs.com for the opportunity to participate in the 2006 virtual case study competition!