Hiscox commissioned a study of business usage of social media usage with Optimum Research, gaining responses from 305 owners, partners and senior decision-makers from UK SMEs with 1 - 249 employees. It also looks at the platforms they engage with as a way to reach their prospects, customers, suppliers and trading partners. Interestingly the study found that 57% of small businesses utilise social media to support their marketing efforts. Looking at the types of platforms they use, Facebook takes precedence with 19% using it for business related social media, compared to 14% who use Linkedin. The most common purpose businesses gave for engaging with social media was to help increase brand awareness (27%) and a further 15% used it to boost sales. According to the study by the Neilsen Company, 53% of adults who use social networks follow particular brands and four in five active Internet users visit blogs and other social platforms. It also reveals that social media for business is predicted to take up a significant amount of digital media budgets for SMEs by the end of 2014.

A Personal Learning Environment or PLE is a potentially promising pedagogical approach for both integrating formal and informal learning using social media and supporting student self-regulated learning in higher education contexts.   ( My PLN/ PLE ) 

Social media 



Social Networks –Allows you to connect with others. Usually they consist of a profile, various ways to interact with others. 
Bookmarking Sites –Allows you to save your work and also lets you access your saved work anywhere.   
Social News – Allows people to post recent news stories on social media/news. 
Media Sharing –Allows you to share things such as pictures and videos.  
Microblogging –Allows short updates that are pushed out to anyone subscribed to receive the updates. 
Blog Comments and Forums – Allows you to message people. . 

HOW TO STAY SAFE ONLINE



1. cyberbulling : cyberbulling is used by using online social media. its included mobile phones, laptops, tablets and all the other useful things.
                                           
2. Harassment : harassment means its
written or its made as comments.

3. ID theft : Identity theft happens when fraudsters access enough information about someone’s identity such as their name, date of birth, current or previous addresses.

4. fraud : In law, fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.

5. invasion of privacy : Invasion of privacy is the intrusion into the personal life of another, without just cause.

YAS! YAAAAAS! YUS!

Social media



Social Networks –Allows you to connect with others. Usually they consist of a profile, various ways to interact with others.

Bookmarking Sites –Allows you to save your work and also lets you access your saved work anywhere.

Social News – Allows people to post recent news stories on social media/news.

Media Sharing –Allows you to share things such as pictures and videos.

Microblogging –Allows short updates that are pushed out to anyone subscribed to receive the updates.

Blog Comments and Forums – Allows you to message people. .

Social media



Social Networks – Services that allow you to connect with other people of similar interests and background. Usually they consist of a profile, various ways to interact with other users.

Bookmarking Sites – Services that allow you to save, organize and manage links to various websites.

Social News – Services that allow people to post various news items.

Media Sharing – Services that allow you to upload and share various media such as pictures and video.

Microblogging – Services that focus on short updates that are pushed out to anyone subscribed to receive the updates. The most popular is Twitter.

Blog Comments and Forums – Online forums allow members to hold conversations by posting messages.

HOW TO STAY SAFE ONLINE



1. Don’t use short passwords.







2. Be careful what you post online.






3. Never open email attachments or click on links from strangers.






4. If you're doing online banking, use all the banks security recommendations.




5. If you get hacked, change your password immediately.


 Protection
    From Cyber bulling 
    From bad websites
   
 Justice
    right to legally seek help if feeling threatened in any way
    right to go to schools, teachers, parents and authorities with concerns about online behaviour

Social Issues:
The Goverement accesses your browser history, the reason for this is, say for example someone searched up ' how to make a bomb ' the Goverment would be VERY suspicious.

In the offline world, communities are typically responsible for enforcing norms of privacy and general etiquette. In the online world, new etiquette challenges abound. On social network sites, this kind of information is now posted online—sometimes in full public view. In some cases, this information is fake. But in other cases, disclosure reaches a level that is troubling for parents and those concerned about the safety of online teens, and once children put this information online, they will never get it back.
Teens are posting a tremendous amount of information on their online profiles, so it is vitally important that teens use strict privacy settings and are savvy about the individuals they allow to view their social networking profile.  Since kids are often trying to catch the attention of and gain approval from their peers, some teens tend to post content to appear popular or to gain a response from others in their online community; teens jockey for status, post risqué pictures, brag about the previous weekend’s adventures, and can easily use this digital space to humiliate others or post inappropriate content.5 No information is truly private in the online world; an online “friend” can forward any information posted on your child’s site in a moment.
Wait while more posts are being loaded