Opportunities for Higher Ed Social Media (webinar)

The Social Campus Report: 8 Opportunities for Higher Ed in 2018 is a free webinar offered by Hootsuite on October 3, 2017
11:00AM PT / 2:00PM ET.

Based on surveys of hundreds of social media pros from schools around the world to understand where they are now—and where they’re going, the webinar will share the results for insights into the state of social media in higher ed - and to discover 8 strategic areas of opportunity.

If October 3, 2017 doesn’t work, register now and they will send you a link to the webinar archived recording once it’s ready.

REGISTER at https://hootsuite.com/webinars/social-campus-report 

Don't Fire the Humans Yet

human intelligence


AI is the thing everyone wants to use. Social media is in love with artificial intelligence. Of course, much as the cry went up when computers first appeared, some people say that "AI will take our jobs."

Facebook has almost 2 billion users. Those users post a lot of content. Mark Zuckerberg has made it clear that live video is a big part of the future of Facebook. But the company has come in for a lot of criticism for violent video posted this year, including murder and suicide.

How does Facebook (and other social media companies) decide what content violates its community standards? They all are desperately implementing and experimenting with AI, but they still rely mostly on humans.

Facebook announced recently that it is using an AI system designed to identify users contemplating suicide or self-harm. How? By using pattern recognition to determine if a post and its comments resemble previous posts identified as being about self-harm. Facebook is also including clearer options for reporting posts that appear to indicate self-harm. It is people reporting to people who determine inappropriateness.

AI-based image-recognition tools that users can use are assisting human moderators now. Can the 54,000 potential cases of sexually related extortion and revenge porn reportedly posted each month can be found and deleted by AI? Not yet. 

Did you see the film Hidden Figures ? In the early 1960s, the mathematicians working at NASA were called "computers" - people who did computations. But those human computers also saw the entry of IBM mainframes into NASA that were better  computers. They realized they would need to become the humans who could program those electronic computers if they wanted to keep working. Take note Facebook and other companies - and anyone who wants to work for those companies: AI requires human intelligence. 

After 2 murders were broadcast live on Facebook in April. Mark Zuckerberg announced that the company would add 3000 employees to the already 4500 employees who work on their Community team reviewing reports on videos. Live video is growing rapidly online, and Facebook Live is a service with 1.9 billion monthly users to broadcast video. Lawmakers in Germany and the UK have also been pressuring social networks to better remove illegal hate speech and clamp down on fake news. The 3000 new workers will monitor all Facebook content not just live videos. This team would operate around the world and will most likely be virtual contract employees.

Just last week, Facebook's "leaked" guidelines for dealing with these types of situations became public that hopefully can make a big difference in preventing suicide and other life-threatening situations.  

The Dark Side

dark side
The dark side - it sounds so evil. Darth Vader and "The Force" used for the wrong things. Online there are a number of "dark" places: darknet, dark web, black web, and black net. And then there is the deep web, which is often associated with (and confused with) these other dark places.
The deep web is all of the information stored online that is not indexed by search engines. You probably use Google for search, but it only indexes a fraction of the Internet. Some estimates say that the web contains 500 times more content than what Google returns in search results.
The results you get when you do a search on Google and other search engines dome from the “surface web.” The results that you're not getting returned would be from the “deep web” or “invisible web”.
Are those things hidden because they are evil or illegal. Actually, much of it hidden for less dramatic reason. Some of it probably would not be relevant to most searchers, or it's old and outdated. A lot of it is in databases that Google is either not interested in indexing or barred from accessing. That is sometimes good for our privacy. You wouldn't want Google to be indexing your phone apps, the files in your Dropbox account, or your social media accounts. Other places, like subscription academic journals and court records are also deeper in the web than search engine can or want to go.
Actually, Google has a separate search engine called deeperweb.com. Give it a try. Search for yourself or some "deep" subject. It doesn't really go deep into the dark and scary Net. Reading their tutorial, you find that DeeperWeb is their metasearch engine that employs tag cloud techniques for navigating through regular Google search results and using Topic Map methods gives results relevant to a specific topic.   
A lot of social media shares occur in what some people call “dark social” which comes from the “dark web” but it might be better called "deep social." 
The dark web is different from the deep web. This darker side is is only accessible by means of special software. Many people using that software to search want to remain anonymous or untraceable. That does sound a bit evil - and it might be. Although someone might be searching anonymously because they would be embarrassed by their search being discovered, someone else could be trying to avoid law enforcement. These darknets form a small part of the larger deep web.
Dark web sites are also where narcotics, firearms, and stolen credit card numbers are bought and sold. They are sites that get shut down sometimes because someone uses them to search for hitmen or share pornography or something else illegal.
But it is not all evil. Journalists and whistleblowers use it to exchange sensitive information. Depending on how you view someone like Edward Snowden, this usage is either treasonous or heroic.
The most common way to access this darknet network made up of servers scattered around the world is through something like Tor. The name is short for The Onion Router (Darknet website URLs often end with .onion rather than .com or .org.) The Tor browser relays traffic through encrypted connections and all the traffic bounces between relays located around the world, making the user "anonymous."
Before you decide to go over to the dark side, know that although your ISP and the government might not be able to view your activity when on the Tor Network, they do know you are on the Tor Network. As this guide to the deep and dark web notes, "that alone is enough to raise eyebrows. In fact, a recent judgment by the US Supreme Court denoted that simply using Tor was sufficient probable cause for the FBI to search and seize any computer around the world."
Many Tor users add a further layer of security via a Virtual Private Network (VPN). But I use VPN provided by my university in order to connect to the their network from off-campus using my own Internet Service Provider (ISP) and have secure access to the university's network resources from anywhere at anytime. Every tool can be used for good and evil. 

Getting Put in Twitter Jail

watching you

As part of Twitter's efforts to limit the visibility of abusive posts, the company is using more automated methods. They (and other social media and news sites) have gotten a lot of bad press the past year for allowing the spread of harmful content. This is certainly a worthy goal, but a difficult one to implement. At one time, many sites relied on human monitors and community managers to respond to abuses, but the volume of posts makes that impossible.

Twitter has expanded its mute and filter features. Now, they will also notify users when they take action on harassment they reported, even if it's not directed at them.

Perhaps most pwerfully - and therefore most frighteningly - Twitter is implementing tools that can automatically identify patterns in the way harmful tweets are made and distributed. CNN reports that "If it identifies a harmful account, it will truncate the user's visibility. For instance, if a user routinely replies to accounts that don't follow it, or repeatedly violates Twitter's rules, Twitter might make it so that the tweets are invisible to everyone except the user's followers for a set amount of time."

That means if you routinely reply to a favorite celebrity (even with kind words) and the celebrity doesn't follow you (and most will not) that invisibility function kicks in. The algorithm thinks you are stalking/harassing the person. This is what someTwitter users have called "Twitter jail."

What behaviors might trigger the algorithm and put you in jail or ban you from Twitter? The company won't say because they don't want people to find workarounds.

Big Brother isn't watching you - an algorithm is...


Teaching Social Media in Higher Ed



I have written elsewhere about a perceived "skills gap" for current employees when it comes to using social media in the workplace. Some social media consultants have said that 90% of workers don't have the skills to leverage social media as a business tool.

It would seem logical that there would be a "market" and interest in higher education to fill in that gap, and more social media courses are being offered at colleges - generally in marketing and communications programs. But for just-in-time training, current employees are also looking to online courses, MOOC offerings and free on-demand resources.

Hootsuite is one of those providers, but it also offers a Student Program that provides educators and their classrooms free access to social media tools and resources. They have a Hootsuite Academy, which obviously uses their own Hootsuite dashboard which is a widely used platform for social media management. They also offer free certification for students who complete the program.

Because I teach social media courses at a university and I also do social media consulting, I looked into the Hootsuite Student Program as another way to integrate hands-on activities into NJIT's online program.

I also see frequent mentions online about a broader “digital skills gap” with employees who don’t know how to use, or are not aware of, the technology available to them. According to a Harris poll survey in Entrepreneur, only one in 10 American workers have mastered their employers’ tools and this gap "Bleeds $1.3 Trillion a Year From US Businesses."

Social media is just one part of this larger gap, but the “meteoric rise” of social in U.S. over the past decade to more than 2.3 billion active social media users worldwide can't be ignored.

Some of the materials in the Hootsuite program were topics that I have always included in my curriculum for designing social media. For example, having students conduct an online reputation audit on a real local gives students a better idea of creating a strategy for a brand versus their personal accounts. Students do research and present an analysis in order to create a strategy to improve their client's social marketing. They research target audience, popular content channels and types, competitor social media use, and make recommendations for future social media marketing activities.

I have students create a social media campaign with objectives, target audience, and metrics. It no longer surprises me that my students often make very little sophisticated use of social media themselves, and have a very limited understanding of how organizations are using it.

One gap I have been attempting to bridge this past year is the lack of knowledge (and interest) in social media ethics and law. That gap is not only in students but in those currently working in social media.

I believe that this learning process has value beyond making students just being able to do marketing via social media, but that creating a social strategy through research, analysis and application, and doing it in a digital world can help bridge a number of skills gaps.


Social Media Research Tools

Social media can be viewed as a distraction. Some people rely on it as a news source. Companies use it for marketing purposes. And some of us study it in a more academic way.

In higher education, we at least touch on all four approaches. Some teachers find it all a useless annoyance. In communications and journalism courses, it is studied as another medium. In business school, it has moved into marketing and advertising courses and conversations. Beyond the theories of social media use, there is learning about the design and analysis of social media.

Studying online communities and social networks is leading to developing new tools and methods for analyzing and visualizing social media data. One of the better compilations of social media research tools has been curated by researchers at the Social Media Lab at Ted Rogers School of Management, Ryerson University.  Their site has more than fifty tools that they have reviewed academically. Many are free tools to use and are fairly simple to implement and use to collect data for analysis, while others require some programming experience.    

http://socialmediadata.org/social-media-research-toolkit/