Social Media for LearningThe aim of this blog is to help you explore the different ways you can interact online using social media and the tools to help you do this.
Social Media ResearchMy publications can be found in SHURA the Sheffield Hallam University Research Archive
Introducing Social MediaSo what is social media you might ask? Social Media is an umbrella term for web based and mobile technology that allows the user to produce and share information with others using text and/or media (video, audio, images), who in turn are then able to engage in a interactive dialogue about the content.
CREATIVE COMMONS LICENCE
Social Media Blog by Sue Beckingham is licensed under a Creative Commons Attribution 4.0 International License.
- Follow Social Media for Learning on WordPress.com
- #SocMedHE15 advanced search audio AudioBoo Blogger Blogs Chrome conference copyright Creative Commons Creative Commons licenses Delicious Design Diigo Education Entertainment Erik Qualman Facebook flickr Gmail Google+ Google Drive Google Hangouts on Air GoogleMaps Google Scholar GoogleStreetView hashtag Identity theft images infographics jargon Kickstarter lifewide learning LinkedIn Lists logo Mari Smith MySpace Netvibes networking Online Communities online presence online reputation Pageflakes passwords pedagogy Periscope Phishing photos professional RSS safety security SEO shortcuts Slideshare social business social media revolution Social network Social Networking Socialnomics social presence StreetView Symbaloo tagging tips Tumblr Tweet Chat Twitter video Vine Wikimedia Foundation Wikipedia WordPress YouTube
- Organising tweets into Lists and Collections using Tweetdeck
- Capturing those golden nuggets of information: the art of digital curation
- New on WordPress.com: Sharing Buttons for WhatsApp, Telegram, and Skype
- VCs in #HigherEd that Tweet
- Using LinkedIn Groups with students and alumni in Higher Education
Category Archives: Safety
Identity theft is a form of stealing someone’s identity in which someone pretends to be someone else by assuming that person’s identity, usually as a method to gain access to resources or obtain credit and other benefits in that person’s … Continue reading
Having just watched an excellent screencast on how to spot a phishing scam created by Nik Peachey, I wanted to share his excellent tips. Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and … Continue reading
Safety We are all using the web more than ever before and saving information including digital photos and videos on our laptops, tablets and PCs; shopping online and sharing information via the social networks we have joined. Something we need … Continue reading