<?xml version="1.0" encoding="UTF-8"?>
<Item xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" Autonumber="false" id="X-K102_3" TextType="CompleteItem" SchemaVersion="2.0" PageStartNumber="0" Template="Generic_A4_Unnumbered" Module="default" DiscussionAlias="Discussion" ExportedEquationLocation="" SessionAlias="" SecondColour="None" ThirdColour="None" FourthColour="None" Logo="colour" ReferenceStyle="OU Harvard" Rendering="OpenLearn" xsi:noNamespaceSchemaLocation="http://www.open.edu/openlearn/ocw/mod/oucontent/schemas/v2_0/OUIntermediateSchema.xsd" x_oucontentversion="2020102004">
    <meta name="aaaf:olink_server" content="http://www.open.edu/openlearn/ocw"/>
    <meta content="https://www.open.edu/openlearn/health-sports-psychology/social-media-and-networks-health-and-social-care/content-section-0" name="dc:source"/>
    <!--ADD CORRECT OPENLEARN COURSE URL HERE:<meta name="dc:source" content="http://www.open.edu/openlearn/education/educational-technology-and-practice/educational-practice/english-grammar-context/content-section-0"/>-->
    <meta content="false" name="vle:osep"/>
    <meta content="mathjax" name="equations"/>
    <CourseCode>K102_3</CourseCode>
    <CourseTitle><!--can be blank--></CourseTitle>
    <ItemID><!--leave blank--></ItemID>
    <ItemTitle>Social media and networks in health and social care</ItemTitle>
    <FrontMatter>
        <Imprint>
            <Standard>
                <GeneralInfo>
                    <Paragraph><b>About this free course</b></Paragraph>
                    <Paragraph>This free course is an adapted extract from the Open University course K102 <i>Introducing health and social care</i>: <a href="http://www.open.ac.uk/courses/qualifications/details/k102?utm_source=google&amp;utm_campaign=ou&amp;utm_medium=ebook">www.open.ac.uk/courses/qualifications/details/k102</a>.</Paragraph>
                    <Paragraph>This version of the content may include video, images and interactive content that may not be optimised for your device. </Paragraph>
                    <Paragraph>You can experience this free course as it was originally designed on OpenLearn, the home of free learning from The Open University –</Paragraph>
                    <Paragraph><a href="https://www.open.edu/openlearn/health-sports-psychology/social-media-and-networks-health-and-social-care/content-section-0?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">www.open.edu/openlearn/health-sports-psychology/social-media-and-networks-health-and-social-care/content-section-0</a></Paragraph>
                    <!--[course name] hyperlink to page URL make sure href includes http:// with trackingcode added <Paragraph><a href="http://www.open.edu/openlearn/money-management/introduction-bookkeeping-and-accounting/content-section-0?LKCAMPAIGN=ebook_&amp;amp;MEDIA=ol">www.open.edu/openlearn/money-management/introduction-bookkeeping-and-accounting/content-section-0</a>. </Paragraph>-->
                    <Paragraph>There you’ll also be able to track your progress via your activity record, which you can use to demonstrate your learning.</Paragraph>
                </GeneralInfo>
                <Address>
                    <AddressLine/>
                    <AddressLine/>
                </Address>
                <FirstPublished>
                    <Paragraph/>
                </FirstPublished>
                <Copyright>
                    <Paragraph>Copyright © 2021 The Open University</Paragraph>
                </Copyright>
                <Rights>
                    <Paragraph/>
                    <Paragraph><b>Intellectual property</b></Paragraph>
                    <Paragraph>Unless otherwise stated, this resource is released under the terms of the Creative Commons Licence v4.0 <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB">http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB</a>. Within that The Open University interprets this licence in the following way: <a href="http://www.open.edu/openlearn/about-openlearn/frequently-asked-questions-on-openlearn">www.open.edu/openlearn/about-openlearn/frequently-asked-questions-on-openlearn</a>. Copyright and rights falling outside the terms of the Creative Commons Licence are retained or controlled by The Open University. Please read the full text before using any of the content. </Paragraph>
                    <Paragraph>We believe the primary barrier to accessing high-quality educational experiences is cost, which is why we aim to publish as much free content as possible under an open licence. If it proves difficult to release content under our preferred Creative Commons licence (e.g. because we can’t afford or gain the clearances or find suitable alternatives), we will still release the materials for free under a personal end-user licence. </Paragraph>
                    <Paragraph>This is because the learning experience will always be the same high quality offering and that should always be seen as positive – even if at times the licensing is different to Creative Commons. </Paragraph>
                    <Paragraph>When using the content you must attribute us (The Open University) (the OU) and any identified author in accordance with the terms of the Creative Commons Licence.</Paragraph>
                    <Paragraph>The Acknowledgements section is used to list, amongst other things, third party (Proprietary), licensed content which is not subject to Creative Commons licensing. Proprietary content must be used (retained) intact and in context to the content at all times.</Paragraph>
                    <Paragraph>The Acknowledgements section is also used to bring to your attention any other Special Restrictions which may apply to the content. For example there may be times when the Creative Commons Non-Commercial Sharealike licence does not apply to any of the content even if owned by us (The Open University). In these instances, unless stated otherwise, the content may be used for personal and non-commercial use.</Paragraph>
                    <Paragraph>We have also identified as Proprietary other material included in the content which is not subject to Creative Commons Licence. These are OU logos, trading names and may extend to certain photographic and video images and sound recordings and any other material as may be brought to your attention.</Paragraph>
                    <Paragraph>Unauthorised use of any of the content may constitute a breach of the terms and conditions and/or intellectual property laws.</Paragraph>
                    <Paragraph>We reserve the right to alter, amend or bring to an end any terms and conditions provided here without notice.</Paragraph>
                    <Paragraph>All rights falling outside the terms of the Creative Commons licence are retained or controlled by The Open University.</Paragraph>
                    <Paragraph>Head of Intellectual Property, The Open University</Paragraph>
                </Rights>
                <Edited>
                    <Paragraph/>
                </Edited>
                <Printed>
                    <Paragraph/>
                </Printed>
                <ISBN><!--INSERT EPUB ISBN WHEN AVAILABLE (.kdl)-->
        <!--INSERT KDL ISBN WHEN AVAILABLE (.epub)--></ISBN>
                <Edition/>
            </Standard>
        </Imprint>
        <Introduction>
            <Title>Introduction</Title>
            <Paragraph>The focus of this course, <i>Social media and networks in health and social care</i>, will be on the concept of internet safety and the possible advantages and disadvantages the internet offers you in terms of health and social care.</Paragraph>
            <Paragraph>You will reflect on your own use of online social networks, along with the ethical and professional issues associated with these when working in health and social care settings. You will be given the opportunity to consider the wide range of health technologies available, and you will also explore the advantages and disadvantages of the internet for vulnerable children and young people with developmental and intellectual disability. The course begins by exploring the theme of ‘the internet’.</Paragraph>
            <Paragraph>This OpenLearn course is an adapted extract from the Open University course <a href="http://www.open.ac.uk/courses/qualifications/details/k102">K102 <i>Introducing health and social care</i></a>.</Paragraph>
        </Introduction>
        <LearningOutcomes>
            <Paragraph>After studying this course, you should be able to:</Paragraph>
            <LearningOutcome>identify the advantages and disadvantages of using the internet in health and social care</LearningOutcome>
            <LearningOutcome>evaluate your own use of online social networks and the implications of these for workers in health and social care</LearningOutcome>
            <LearningOutcome>evaluate the impact of the internet on the experiences of users of health and social care services.</LearningOutcome>
        </LearningOutcomes>
        <Covers>
            <Cover template="false" type="ebook" src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_3_epub_1400x1200.jpg"/>
            <Cover template="false" type="A4" src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_3_pdfimage_19x12-6_300d.jpg"/>
        </Covers>
    </FrontMatter>
    <Unit>
        <UnitID><!--leave blank--></UnitID>
        <UnitTitle><!--leave blank--></UnitTitle>
        <Session>
            <Title>1 The internet</Title>
            <Paragraph>The internet is:</Paragraph>
            <Quote>
                <Paragraph>a global network of computers that works much like the postal system, only at sub-second speeds. Just as the postal service enables people to send one another envelopes containing messages, the internet enables computers to send one another small packets of digital data.</Paragraph>
                <SourceReference>(BBC, 2014)</SourceReference>
            </Quote>
            <Paragraph>Almost all adults (91%) in the UK use the internet and adults with disabilities are increasing their use of the internet too (78% of those with reported disability use the internet). Adults aged 65 years or over who report using the internet is also increasing year-on-year (Office of National Statistics (ONS), 2019a). Email is one of the most common uses of the internet used by adults in Great Britain (86%) and 63% of adults report using the internet to search for health-related information. Other popular uses of the internet include internet banking, reading news, making calls and using social media (ONS, 2019b). Over 84% of adults use the internet via a mobile or smartphone (ONS, 2019a).</Paragraph>
            <Activity>
                <Heading>Activity 1 Top five uses of the internet</Heading>
                <Question>
                    <Paragraph>Drag and drop these uses of the internet in order of popularity.</Paragraph>
                </Question>
                <Interaction>
                    <Matching>
                        <Option>
                            <Paragraph>Sending and receiving emails</Paragraph>
                        </Option>
                        <Match x_letter="a">
                            <Paragraph>1.</Paragraph>
                        </Match>
                        <Option>
                            <Paragraph>Finding information about goods or services</Paragraph>
                        </Option>
                        <Match x_letter="d">
                            <Paragraph>2.</Paragraph>
                        </Match>
                        <Option>
                            <Paragraph>Internet banking</Paragraph>
                        </Option>
                        <Match x_letter="c">
                            <Paragraph>3.</Paragraph>
                        </Match>
                        <Option>
                            <Paragraph>Reading the news</Paragraph>
                        </Option>
                        <Match x_letter="e">
                            <Paragraph>4.</Paragraph>
                        </Match>
                        <Option>
                            <Paragraph>Making video or voice calls</Paragraph>
                        </Option>
                        <Match x_letter="b">
                            <Paragraph>5.</Paragraph>
                        </Match>
                    </Matching>
                </Interaction>
                <Discussion>
                    <Paragraph>The top five uses of the internet by percentage of adults over 16 years of age are:</Paragraph>
                    <NumberedList class="decimal">
                        <ListItem>Sending and receiving emails (86%)</ListItem>
                        <ListItem>Finding information about goods or services (78%)</ListItem>
                        <ListItem>Internet banking (73%)</ListItem>
                        <ListItem>Reading online news (66%)</ListItem>
                        <ListItem>Making video or voice calls (50%)</ListItem>
                    </NumberedList>
                    <Paragraph>Figure 1 shows the top five uses of the internet between 2009 and 2019 (ONS, 2019b). The maroon lines show the figures for the year 2019 and the blue are from 2009. You will see that over the course of the decade the use of the internet dramatically increased.</Paragraph>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_blk06_topic03_f007.eps" x_printonly="y" x_folderhash="f9841e19" x_contenthash="c8ccdf14" x_imagesrc="k102_blk06_topic03_f007.eps.png" x_imagewidth="512" x_imageheight="303"/>
                        <Caption><b>Figure 1</b> Internet activities within the last three months, Great Britain, 2009 and 2019.</Caption>
                        <Alternative>The graphic shows five internet activities and the percentage of adults in Great Britain who engage with them, year 2009 compared with 2019. The five activities and the percentages in 2009 and 2019 are: Sending and receiving emails: 2009 – 68%, 2019 – 86%; Finding information about goods and services: 2009 – 59%, 2019 – 59%; Internet banking: 2009 – 41%, 2019 – 73%; Reading online news, newspapers or magazines: 2009 – 39%, 2019 – 66%; Making video or voice calls over the internet (e.g. Skype or Facetime): 2009 – 16%, 2019 – 50%.</Alternative>
                        <Description>The graphic shows five internet activities and the percentage of adults in Great Britain who engage with them, year 2009 compared with 2019. The five activities and the percentages in 2009 and 2019 are: Sending and receiving emails: 2009 – 68%, 2019 – 86%; Finding information about goods and services: 2009 – 59%, 2019 – 59%; Internet banking: 2009 – 41%, 2019 – 73%; Reading online news, newspapers or magazines: 2009 – 39%, 2019 – 66%; Making video or voice calls over the internet (e.g. Skype or Facetime): 2009 – 16%, 2019 – 50%.</Description>
                    </Figure>
                </Discussion>
            </Activity>
            <Section>
                <Title>1.1 Advantages and disadvantages</Title>
                <Paragraph>The internet provides a wealth of health and care related information. The majority of health and care organisations now have an online presence, providing information such as their staff, missions, values and services. Websites such as NHS Choices and patient info provide a range of information about signs, symptoms, diagnosis and treatment of conditions. In addition, National Institute for Health and Care Excellence (NICE) has a variety of knowledge sheets and provides guidance on the recommended diagnosis, treatment and care for lots of different conditions such as diabetes, obesity, high blood pressure and heart disease. NICE guidance in particular is good quality evidence to use in your academic work.</Paragraph>
                <Paragraph>Other websites can be run by charitable organisations that provide information for service users, sources of advice and support. Many have discussion forums and/or social media pages where people can talk with others in the same or similar circumstances, e.g. AgeUK, the British Heart Foundation and Cancer Research UK. Pharmacies, GP consultations and private care services are also often available online.</Paragraph>
                <Activity>
                    <Heading>Activity 2 What are the advantages and disadvantages of the internet?</Heading>
                    <Question>
                        <Paragraph>Using the drop down choices below, identify whether you think each of the following statements is an advantage or disadvantage of the internet for health and care, or both.</Paragraph>
                        <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_b6_t2_3-1-1.zip" type="html5" height="600" id="k102_b6_t2_3-1-1" width="*" x_folderhash="f9841e19" x_contenthash="0d156b78"/>
                    </Question>
                    <Discussion>
                        <Paragraph>You might have come to different conclusions about whether each of these was an advantage or disadvantage. There are no right or wrong answers. Here are some example answers.</Paragraph>
                        <NumberedList>
                            <ListItem><Paragraph>Fast and efficient communication – Advantage</Paragraph><Paragraph>The internet makes it easy to correspond with people in any geographic location and this is often viewed as an advantage. Professionals are able to network easily with others across the world.</Paragraph></ListItem>
                            <ListItem><Paragraph>Information can be lost easily – Disadvantage</Paragraph><Paragraph>Hackers, computer viruses and problems with hardware can often cause information to be lost or stolen very easily. Information lost this way is often irretrievable.</Paragraph></ListItem>
                            <ListItem><Paragraph>The internet is global – Both</Paragraph><Paragraph>The ability to network with people from around the world is a wonderful opportunity, especially if you have friends or relatives living overseas. However, health and care information, recommended guidance, services and policies vary greatly from country to country and might not be relevant or accurate for your particular location.</Paragraph></ListItem>
                            <ListItem><Paragraph>Privacy and security, spam and viruses – Disadvantage</Paragraph><Paragraph>The risk to privacy, the security of information and risk of computer viruses wiping or stealing information from your computer is frequently of concern for many. It is not always possible to know what data you are sharing or leaving behind every time you use the internet. Emails can easily be lost or sent to the wrong person.</Paragraph></ListItem>
                            <ListItem><Paragraph>Information can be shared easily – Both</Paragraph><Paragraph>Electronic health records are a great opportunity for professionals and organisations to share information about care and optimise care delivery. However, sometimes information is shared too freely and it is not always possible to know that you are sharing the right information with the right person at the right time.</Paragraph></ListItem>
                            <ListItem><Paragraph>Social networking: access to advice and other people in similar circumstances – Both</Paragraph><Paragraph>Social networks and access to online discussion forums can be a valuable source of support. This means that service users can obtain information from others in similar circumstances or ask questions and get responses very quickly. However, it is not always possible to confirm whether the person you are speaking with is who they say they are, or if they are providing the correct advice and information. There are also risks associated with sharing personal information in these platforms.</Paragraph></ListItem>
                            <ListItem><Paragraph>Finding information about professionals and organisations who provide care – Advantage</Paragraph><Paragraph>You can now find lots of information about NHS trusts, care homes and organisations who provide care. This helps you to understand what services they provide. For example, staff profiles let you see what qualifications and experience the professionals who care for you have. Online public reviews of these organisations also means you can provide and see others’ feedback about their performance.</Paragraph></ListItem>
                            <ListItem><Paragraph>Finding information about health, signs, symptoms and diagnosis – Both</Paragraph><Paragraph>Information about health and what to expect from treatments are very useful. It can also help you to make decisions about what service you need and in what circumstance, e.g. whether to go to your GP or urgent care centre. However, not all websites are created equally and the information available online is not always credible or accurate; it might be that it is only relevant to certain geographic locations too. Service users can also be deterred from seeking help when they actually need to and vice versa.</Paragraph></ListItem>
                        </NumberedList>
                    </Discussion>
                </Activity>
            </Section>
            <Section>
                <Title>1.2 Health and care on the internet</Title>
                <Paragraph>In the previous activity you will have identified a range of advantages and disadvantages of the internet for health and care. The motivation or reason for someone using the internet can play a role in whether it is seen as an advantage or disadvantage. Some of the most common uses of the internet for health and care include: seeking information about signs, symptoms, diagnosis and treatment; connecting with other patients or carers; linking with health and care providers; information about diet and nutrition. Many people use the internet as a primary source of information, over and above more traditional ‘printed’ information, talking to friends, family, colleagues and even health and care professionals (Jacobs <i>et al.</i>, 2017).</Paragraph>
                <Paragraph>The next activity gets you to think about how you might have used the internet for health and care.</Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_blk06_topic03_f003.eps" x_printonly="y" x_folderhash="f9841e19" x_contenthash="0196a615" x_imagesrc="k102_blk06_topic03_f003.eps.jpg" x_imagewidth="512" x_imageheight="341"/>
                </Figure>
                <Activity>
                    <Heading>Activity 3 Using the internet for health information</Heading>
                    <Question>
                        <Paragraph>Think about how you might use or have used the internet for the purpose of health and care. In the box below, type in three things that describe how you have used the internet for these purposes.</Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="fra3"/>
                    </Interaction>
                    <Discussion>
                        <Paragraph>Jaks <i>et al.</i> (2019) and Moreland <i>et al.</i> (2015) suggest some reasons why people use the internet for health and care information:</Paragraph>
                        <BulletedList>
                            <ListItem>finding information to take to an appointment or consultation to discuss with the professional</ListItem>
                            <ListItem>finding information about signs and symptoms to make decisions about seeking face-to-face support and the type of support. For example, whether to take a child with a fever to the GP or urgent care</ListItem>
                            <ListItem>seeking information about a service provider</ListItem>
                            <ListItem>getting responses to queries and questions quickly, 24 hours a day, particularly through social networks</ListItem>
                            <ListItem>seeking emotional support and information from others with the same diagnosis/condition/situation</ListItem>
                            <ListItem>to improve knowledge of a diagnosed condition and how to manage it</ListItem>
                            <ListItem>finding information to improve health and wellbeing generally e.g. diet advice, weight loss.</ListItem>
                        </BulletedList>
                        <Paragraph>As you have seen, there are plenty of benefits and reasons to use the internet for health and care purposes. However, the internet also brings with it a wide range of disadvantages and risks. </Paragraph>
                    </Discussion>
                </Activity>
                <Paragraph>The next section will explore potential disadvantages and risks of the internet relevant to a particular group of vulnerable children and young people.</Paragraph>
            </Section>
            <Section>
                <Title>1.3 Children, young people and the internet</Title>
                <Paragraph>While the internet can offer a wealth of advantages, some of which you have explored in previous sections, there are a range of risks and challenges when using it, particularly for children and young people. Conversely, children and young people with developmental and intellectual disability or mental health conditions are particularly vulnerable to the risks of the internet.</Paragraph>
                <Paragraph>Online abuse can reflect that which occurs in the offline world, such as emotional abuse, grooming, sexual abuse, sexual exploitation and radicalisation, but some is predominantly online only, such as cyberbullying and sexting (NSPCC, 2019). There might also be many others that you will come across in the next activity. Online abuse can occur through a range of platforms and can potentially lead to offline abuse, as you will see below.</Paragraph>
                <Box>
                    <Paragraph><b>Cyberbullying:</b> This is bullying that occurs online. This type of bullying can follow the child wherever they use the internet or mobile technology.</Paragraph>
                    <Paragraph><b>Emotional abuse:</b> This is the continuous emotional mistreatment of a child. This can happen both online and offline.</Paragraph>
                    <Paragraph><b>Grooming:</b> This can happen online or offline and involves another person, typically an adult, building a relationship with a child with the intent to abuse or exploit them.</Paragraph>
                    <Paragraph><b>Sexting:</b> This is the online use of messaging technology in a range of platforms with the purpose of sharing sexual or naked images or messages. Children can be coerced into sending these images.</Paragraph>
                    <Paragraph><b>Sexual abuse:</b> This involves forcing a child into sexual activities, e.g. viewing or sharing sexual related content either online or offline.</Paragraph>
                    <Paragraph><b>Sexual exploitation:</b> Being forced to create and/or share explicit content. This can happen online or offline.</Paragraph>
                    <Paragraph><b>Radicalisation:</b> The process of persuading or coercing a child or young person to adopt extreme political, religious or social views.</Paragraph>
                </Box>
            </Section>
            <Section>
                <Title>1.4 Working with vulnerable young people online</Title>
                <Paragraph>While it is recognised that all children and young people are vulnerable to the risks of the internet, there are, as indicated in the previous section, particular groups of children and young people who are especially vulnerable. Some research suggests that children and young people with intellectual disability, such as autistic spectrum disorder or attention deficit hyperactivity disorder, are at risk of ‘being left behind’ with regards to internet access (Agren <i>et al.</i>, 2018). It is known that this particular group can be more at risk of the dangers associated with the internet: they might have poor insight and judgement about the dangers, have a desire to make friends and be ‘included’ and as a result of difficulties with peer-to-peer social skills they might feel more comfortable engaging with people online (Chiner <i>et al.</i>, 2017; Buijs <i>et al.</i>, 2017; Normand and Sallafranque-St-Louis, 2016).</Paragraph>
                <Paragraph>The following activity explores the challenges when working with children and young people with intellectual disability, those who have experienced potentially traumatic events or frequent and significant life events, may live in foster care, with a special care order in place or in a specialist residential setting. It uses the real life experiences of a family support worker who works with children and young people from this group.</Paragraph>
                <Activity>
                    <Heading>Activity 4 Discussions with a family support worker</Heading>
                    <Question>
                        <Paragraph><b>Please note:</b> you are advised to undertake this activity on a desktop computer as the crossword may not appear correctly on smaller screens.</Paragraph>
                        <Paragraph>Note that the audios use pseudonyms to respect the confidentiality of the people and service users associated with the organisation in which the family support worker is employed.</Paragraph>
                        <Paragraph>Listen to each audio and then complete the crossword clues for each one.</Paragraph>
                        <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_2019j_aug040a.mp3" type="audio" x_manifest="k102_2019j_aug040a_1_server_manifest.xml" x_filefolderhash="f9841e19" x_folderhash="f9841e19" x_contenthash="bc5088fb">
                            <Caption>Audio 1</Caption>
                            <Transcript>
                                <Paragraph>Most young people that are referred to us all have a diagnosis of autism, attention deficit and hyperactivity disorder, they have mental health difficulties, attachment issues and trauma based behaviours. A lot of the young people I have worked with have had a lot of traumatic early years experience in education. They’ve been excluded on numerous times and been to different mainstream settings and in and out of education for maybe four or five years. Some of the young people have also been home educated for long periods of time. A lot of the young people that we look after are on care orders so they could be fostered, adopted or under special guardianship order.</Paragraph>
                                <Paragraph>The challenges that I face every day with working with this specific group of children on the internet is that they have difficulties with their social interactions with peers and they find it hard to form appropriate relationships and sustain them. Our young people are also desperate to have friends and they will put themselves in vulnerable positions to form relationships; i.e. sending inappropriate pictures or talking to strangers or sending explicit texts. They also end up having arguments over the internet which causes conflict in the setting, young people not always recognising the dangers of the internet and the risks that they put themselves under. Also they can, like, grooming or watching harmful material, pornography and they also can access, like, self harm videos in order to hurt themselves.</Paragraph>
                                <Paragraph>I’ve seen child sexual exploitation, child criminal exploitation, online sexual abuse. Radicalisation which is where you are groomed to be involved in terrorism.</Paragraph>
                                <Paragraph>Online gambling, now this is quite a recent one that I’ve been involved with, where a young person actually stole the credit card – parent’s credit card and is quite fixed actually and got a, like, an addiction to it and has spent thousands of pounds on mum’s credit card.</Paragraph>
                                <Paragraph>So the specific group of children that I work for all have experienced some significant trauma or event and this has had such a huge impact on their emotional and social needs, therefore leaving them completely vulnerable to online grooming. They are so desperate to make friends and this can look very obsessive to us because they haven’t got the social skills.</Paragraph>
                                <Paragraph>Young people may display risky behaviours online, particularly on the chatrooms like Facebook, Whatsapp. They may feel more confident in talking to strangers than they do to their own friends or family. They share their personal information including names, addresses, phone numbers, where they live and what school they go to and they don’t actually realise that the person on the other end could be an abuser. Young people may exchange self sexual images or videos through mobile phones or other devices, Facebook being top of the list for this. These images can be shared to other members of the group and also they don’t realise that once they’ve put this picture up it’s there for good.</Paragraph>
                            </Transcript>
                        </MediaContent>
                        <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_2019j_aug040b.mp3" type="audio" x_manifest="k102_2019j_aug040b_1_server_manifest.xml" x_filefolderhash="f9841e19" x_folderhash="f9841e19" x_contenthash="35fe010c">
                            <Caption>Audio 2</Caption>
                            <Transcript>
                                <Paragraph>The children have training in internet safety. We recognise that actually having taken the internet away and sanctioning is not helping the young people because at the end of the day this is their life. This is what they need all the time and also as they go into employment the internet is going to be there so our kind of philosophy on it is to teach them better ways and to help them keep safe online. So what we do we have got planned online safety programmes that are led through the ICT lessons and also this is readdressed in tutor times as well.</Paragraph>
                                <Paragraph>Within my group work I address pornography and we look at fantasy versus reality and the fact that actually pornography isn’t actually real. They think it’s real because they’re watching it but actually it’s quite violent and they do things that perhaps in a normal loving relationship people wouldn’t want to do. We explore that and we talk about it open and honestly so that the young people have a clear understanding that actually pornography is not real.</Paragraph>
                                <Paragraph>Recently I’ve been involved with a case. Her name was Jess and she’s a looked after child in the foster care system. She’s particularly vulnerable because she has been in and out of several different foster placements since two years old. She has obviously been through the trauma of going into care from birth and then moved so many different times and then she was placed with us when she was twelve. She became a little bit more settled but she liked her internet and at the weekends she used to go home to her foster placement. She had a love of makeup, hair, fashion.</Paragraph>
                                <Paragraph>She used to take lots of selfies of herself and then when one night she was at home on her own and doing what she does on the internet she made a fake Facebook account and put on her profile where she lived, the settings and her phone number and she also put her address on. She also, within that device, her location settings were set on so you know that means that some people outside can find you. She started posting her pictures, her modelling pictures, her selfies and she made herself up with all her makeup. Some of the pictures were quite provocative and then she was chatting with her friends and then this message came up from a lady saying, oh I like your picture.</Paragraph>
                                <Paragraph>Showing an interest in that she said thank you and then the lady said to her you are absolutely beautiful and the girl was really taken, all girls like to feel beautiful. This lady then made her feel really special and wanted and Jess started opening up to her saying she was unhappy and she’d been through the care system but she really, really as she gets older, wants to be a model. The woman then started to manipulate, saying you could be a model, I know someone. Just send me some more pictures. I can help you. The woman showing interest in her, again complimenting her all the time now developing her trust in a warming relationship. The woman now said well I do know someone but I need to see you topless. Is that okay? Jess complied because she thought she was gonna be a model and the woman replied she wants to come over to her house and do some real pictures. Jess at that point got scared and said no.</Paragraph>
                                <Paragraph>The woman said to her if you don’t let me come to your house I will share your naked pictures with all your friends and all your family and then she text back her address and I know where you live and actually wrote her address. Luckily Jess at that time turned everything off and came to see a member of staff and disclosed this. At the time we were really scared for her because we thought who is this woman.</Paragraph>
                                <Paragraph>She talked to the staff and the staff obviously then passed it on to the designated safeguarding lead which is where I got involved. Having seen this information we were really concerned about who this woman was and so we called the police and we also made a referral to social services. Within 24 hours the police went round to Jess’s house and removed all the devices. This actually took nearly eight months for the police to actually go through the device and find out exactly have had gone on. It was concerning because obviously this woman did have this girl’s address so we did put safeguarding concerns in place. We let the foster carers know and, you know, they kept a close eye. After the investigation was over a man of 48 years old was arrested for sexual abuse online for ten girls all under the age of twelve.</Paragraph>
                            </Transcript>
                        </MediaContent>
                        <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_2019j_aug040c.mp3" type="audio" x_manifest="k102_2019j_aug040c_1_server_manifest.xml" x_filefolderhash="f9841e19" x_folderhash="f9841e19" x_contenthash="5cfe9e73">
                            <Caption>Audio 3</Caption>
                            <Transcript>
                                <Paragraph>Online safety messages should be put on throughout the curriculum even if you are doing maths, English and science, just as a reminder that if you are working on IT that there are still risks around that.</Paragraph>
                                <Paragraph>Young people should be helped to understand the need of online safety to be open and honest and discuss the risk and discuss their concerns as well. Adults should also I think show a positive role model when using the internet within their setting and teach them safer ways. So there’s many websites out there to help parents and professionals to keep their children safe online. However, it’s a huge task as everything changes all the time.</Paragraph>
                                <Paragraph>The young people also are always one step ahead of us as we and the parents and carers need to be alert of that and just keep checking that the parenting controls remain because the students obviously know how to turn them off. Parents are also unaware of all the online dangers themselves. Often leaving the children unsupervised for long periods of time whilst on the internet on games consoles, particularly this year Fortnite’s been an absolute nightmare where grooming has taken place where young people have been talking to strangers over the line and you know they buy them skins.</Paragraph>
                                <Paragraph>I have had many naked pictures sent to me by parents saying oh my goodness please help my children I don’t know what to do. What they don’t actually realise is that by sharing that naked picture with me they’ve just broken the law and actually what they are doing is sharing child pornography.</Paragraph>
                                <Paragraph>They don’t report concerns very much. It’s often when the staff do spot checks online and they look at their devices that we find things.</Paragraph>
                                <Paragraph>My top ten kind of tips would be it’s all about education and making the parents and carers and the staff aware about the vulnerability of this particular group of young people.</Paragraph>
                                <Paragraph>In my group work and in the work that you do with young people we need to look at them building healthy relationships with staff and their carers so they feel that they can come to you with any concerns. It’s also looking at a healthy relationship. A lot of young people I work with don’t really understand what a healthy relationship is. They think it’s acceptable for people to emotionally abuse you or to maybe give you a slap. They think that’s acceptable because that’s what they’ve been brought up in.</Paragraph>
                                <Paragraph>Education on grooming and what that looked like, how it happens and how the grooming process works. Sexting and the law, a lot of the time when I do the group work all that comes out of it is the fact that the children don’t understand that they can have sex at sixteen which is physical and yet they can’t look at naked pictures or pornography.</Paragraph>
                                <Paragraph>That is one that comes up all the time and to be honest I’m honest with the young people and say I actually don’t know but what I do know is that you are breaking the law and you will get yourself in trouble if you do these things, if you look at pornography or you send naked pictures.</Paragraph>
                                <Paragraph>Having a safeguarding policy within your provision is paramount. The government legislation is on keeping children safe in schools and education. This is the main kind of legislation that everyone needs to be working for in order to keep people safe, and staff and carers need to report their concerns to the DSL and we will immediately react if we need to.</Paragraph>
                                <Paragraph>Monitoring is paramount in the houses that we work for, they do spot checks on the children’s devices and also have an internet safety contract where they give us their passwords and things like that.</Paragraph>
                                <Paragraph>There’s helplines out there. The Child Exploitation Online Protection Service which is out there known as CEOPS. Within that there is a Thinkuknow website which does all training for staff, professionals and it also gives online safety tips for children.</Paragraph>
                                <Paragraph>The young people do really listen and they take it onboard and they say the right things and they know how to keep themselves safe but you can guarantee that within two to three weeks I’m looking at more safeguarding reports where they’ve been sending naked pictures or they’ve been looking at inappropriate content.</Paragraph>
                                <Paragraph>I believe this specific group of young people because they are so vulnerable because of their experiences and their need and their lack of awareness, it makes them particularly vulnerable in this area.</Paragraph>
                            </Transcript>
                        </MediaContent>
                        <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_b6_t2_3-1-4.zip" height="1600" id="k102_b6_t2_3-1-4" type="html5" width="*" x_folderhash="f9841e19" x_contenthash="4047bb50"/>
                    </Question>
                    <Discussion>
                        <Paragraph>You will have heard the family support worker talking about a range of challenges faced by children and young people in this vulnerable group. Children and young people who have experienced trauma, have developmental or intellectual disability or who are in a residential setting for these reasons are more vulnerable to the risks of the internet than those in mainstream education. They struggle more to understand and form appropriate relationships, find face-to-face social interaction challenging and lack awareness of the risks of sharing personal information.</Paragraph>
                        <Paragraph>You will have heard about a case where a young person used a parent’s credit card to gamble online, ran up a large bill and became obsessed with the activity. You have also heard about ‘Jess’, who was groomed online by someone she believed was a woman who she thought was her friend, eventually asking her to share inappropriate sexual images and was able to find her home address. This also raised the issues of sharing personal information online and leaving on ‘location service’ functions in online social networks such as Facebook or WhatsApp.</Paragraph>
                        <Paragraph>The family support worker manages online risks for this vulnerable group by:</Paragraph>
                        <BulletedList>
                            <ListItem><Paragraph>education of staff, children, young people, parents and carers</Paragraph><Paragraph>This education should be embedded into the curriculum and wherever information technology is being used. Staff in this setting are trained three times per year to make sure they are up to date with this rapidly changing technology. Parents and carers should be educated about privacy settings, monitoring these settings and also supervision of children while they are using the internet.</Paragraph></ListItem>
                            <ListItem><Paragraph>carrying out individual or group work with those most at risk or where an incident has been reported</Paragraph><Paragraph>The group work allows for an honest and open conversation about information on the internet, e.g. that sites showing pornography are not ‘reality’.</Paragraph></ListItem>
                            <ListItem>having a safeguarding policy that is regularly reviewed and updated</ListItem>
                            <ListItem><Paragraph>referring to credible and reliable resources on the topic of internet safety</Paragraph><Paragraph>An example of these resources are those from <a href="https://www.ceop.police.uk/safety-centre/">Child Exploitation and Online Protection Command</a> (CEOPs).</Paragraph></ListItem>
                            <ListItem>being open and honest with the young people without the need to remove technology completely.</ListItem>
                        </BulletedList>
                        <Paragraph>This encourages them to report any concerns they have, ask any questions and teach them how to use technology safely in day-to-day life, as they will have to when they are an adult.</Paragraph>
                    </Discussion>
                </Activity>
            </Section>
        </Session>
        <Session>
            <Title>2 The internet, social media and me</Title>
            <Paragraph>In the digital age, almost all of us have a ‘digital footprint’. Your digital footprint is the data that you leave behind when you engage with the internet; this can be social media ‘likes’, posts, pictures or email. In other words, we have some information about us on the internet; this could be something as simple as email, online purchases or social media accounts.</Paragraph>
            <Paragraph>Health and social care professionals have to make sure that they are able to justify their actions and decisions, work for the best interests of their service users and work within the confines of their employer policy. This is part of being ‘responsible’ and ‘accountable’ for actions and decisions.</Paragraph>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_blk06_topic03_f004.eps" x_printonly="y" x_folderhash="f9841e19" x_contenthash="c5da58d6" x_imagesrc="k102_blk06_topic03_f004.eps.jpg" x_imagewidth="429" x_imageheight="431"/>
            </Figure>
            <Paragraph>Healthcare Professional Targeted Googling (HCPTG) is a relatively new concept emerging in research literature. This is when patients or service users search for organisations or individual health and social care workers using the internet. Ryan<i> et al.</i> (2019) discussed this concept with some members of the public and there is evidence to suggest that it can have both a positive and negative affect on the perceptions of an individual or organisation. For example, certain ‘star’ systems and ‘reviews’ can tell us how a service is performing from the user perspective or, alternatively, it can give us professional information about health and social care workers through organisational online profiles.</Paragraph>
            <Paragraph>However, if too much of our personal information is made to be public this could provide a negative view of the person, e.g. evidence of profane language, strong political/religious views, comments about the workplace, etc. In addition, some service users might try to contact professionals through platforms such as Facebook which could cross important boundaries between the patient/service user and professional/employee.</Paragraph>
            <Paragraph>It is important that you have an awareness of your digital footprint and what types of information are publicly accessible. </Paragraph>
            <Paragraph>The next section encourages you to explore this in the context of online social networks and social media.</Paragraph>
            <Section>
                <Title>2.1 Defining online social networks</Title>
                <Paragraph>The term ‘Online Social Network (OSN)’ refers to people connecting through a range of platforms, enabling users to share personal or professional information on a profile (Ryan, 2019). ‘Online Social Media (OSM)’ places its emphasis on social relationships, but is better used to describe the media by which those relationships exist (e.g. video, photos, blogs) (Ryan, 2019). Hence, OSNs represent the platform for the online presence and the relationships within it while OSM is a facilitator and method of communication that links the online presence (Ryan, 2019). The world of social media is constantly changing with new sites and apps being added to the offering. In 2019, the most popular social networks worldwide were Facebook, YouTube, WhatsApp, Facebook Messenger and WeChat (Statista, 2019).</Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_blk06_topic03_f006.eps" x_printonly="y" x_folderhash="f9841e19" x_contenthash="e6b827f2" x_imagesrc="k102_blk06_topic03_f006.eps.jpg" x_imagewidth="512" x_imageheight="340"/>
                </Figure>
                <Paragraph>You might have heard of the following types of platform:</Paragraph>
                <BulletedList>
                    <ListItem>wikis such as Wikipedia</ListItem>
                    <ListItem>blogs such as WordPress and Tumblr</ListItem>
                    <ListItem>microblogs such as Twitter</ListItem>
                    <ListItem>video and media platforms such as YouTube, Instagram and Snapchat</ListItem>
                    <ListItem>social networks such as Facebook and LinkedIn.</ListItem>
                </BulletedList>
                <Paragraph>The next activity encourages you to think about different types of OSN and OSM and the purpose for which they are used.</Paragraph>
                <Activity>
                    <Heading>Activity 5 Making the most of social networking</Heading>
                    <Question>
                        <Paragraph>Complete the following activities on the topic of social networks.</Paragraph>
                        <NumberedList>
                            <ListItem><a href="https://www.open.ac.uk/libraryservices/resource/learningobject:XJ0036&amp;f=30561">Social networking: is it for me?</a></ListItem>
                            <ListItem><a href="https://www.open.ac.uk/libraryservices/resource/learningobject:XJ0031&amp;f=30561">Keeping up-to-date using online networking</a></ListItem>
                        </NumberedList>
                    </Question>
                    <Discussion>
                        <Paragraph>These activities enabled you to explore the different types of social networks and the different platforms appropriate for different purposes: general, professional and special interest. You might already use some or all of these types of social networks or you might have chosen not to engage with social networks at all. You will have considered the benefits of social networks and developed knowledge about how to select an appropriate platform for different purposes.</Paragraph>
                    </Discussion>
                </Activity>
                <Paragraph>The next section further explores your interaction with OSN and OSM.</Paragraph>
            </Section>
            <Section>
                <Title>2.2 Reflecting on your digital footprint</Title>
                <Paragraph>Research has shown that many professionals and students training to be a professional have ‘awareness’ of their digital footprint but when they actually examine what they share online they are surprised by the amount of information that is available (Ryan, 2017a, b). The next activity will ask you to reflect on the type of information you share with the public in social media.</Paragraph>
                <Activity>
                    <Heading>Activity 6 Assessing your own use of social media</Heading>
                    <Question>
                        <Paragraph><b>Note: if you do <i>not</i> have a social media account then you should complete the ‘alternative’ activity which follows this one.</b></Paragraph>
                        <Paragraph>Choose one of your personal social media profiles to focus on as part of this activity:</Paragraph>
                        <BulletedList>
                            <ListItem>Facebook</ListItem>
                            <ListItem>Twitter</ListItem>
                            <ListItem>Instagram</ListItem>
                        </BulletedList>
                        <Paragraph>Once you have chosen one of these answer the questions in the following interactive.</Paragraph>
                        <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/social-media-quiz.zip" id="social-media-quiz1" height="600" type="html5" width="*" x_folderhash="f9841e19" x_contenthash="6033cfc9">
                            <Parameters>
                                <Parameter name="ref_id" value="test1"/>
                            </Parameters>
                        </MediaContent>
                        <Paragraph>Now, put yourself in the position of someone visiting your profile who doesn’t know you. Answer the same questions from their perspective, and at the end of the activity you’ll see how their perspective differs from yours.</Paragraph>
                        <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/social-media-quiz.zip" id="social-media-quiz2" height="600" type="html5" width="*" x_folderhash="f9841e19" x_contenthash="6033cfc9">
                            <Parameters>
                                <Parameter name="ref_id" value="test2"/>
                                <Parameter name="compare_to" value="test1"/>
                            </Parameters>
                        </MediaContent>
                    </Question>
                    <Discussion>
                        <Paragraph>You might have been surprised by the things that you thought would be available to the public, compared with those that were (i.e. what you thought you shared versus what you actually share and what information about you is actually available to the public). You might now decide to change your privacy settings or behaviour online as a result of this activity. You should check and update your privacy settings frequently, especially if platforms have made amendments or updates to these policies. You can revisit this tool at anytime in the future to help you think about what you ‘think’ you share compared to what you ‘actually’ share.</Paragraph>
                    </Discussion>
                </Activity>
                <Activity>
                    <Heading>Alternative Activity 6</Heading>
                    <Question>
                        <Paragraph><b>Undertake this activity if you cannot complete the activity above.</b></Paragraph>
                        <NumberedList class="decimal">
                            <ListItem>Identify at least two health and social care organisations in your region, this could be an NHS trust, charity, care home or private organisation such as BUPA.</ListItem>
                            <ListItem>In your web browser, search for the name of the organisation.</ListItem>
                            <ListItem>Note down any social media profiles the organisation uses and have a look at some of the ‘user reviews’ if there are any available.</ListItem>
                            <ListItem>Open at least one of the social media pages for this organisation and look at some of the recent posts, then complete the table below. If user reviews are available for the organisation, have a look at some of the most recent.</ListItem>
                            <ListItem>Complete stages 1–4 for the second organisation you selected.</ListItem>
                        </NumberedList>
                        <Paragraph>Make some notes in answering these questions.</Paragraph>
                        <Table class="normal">
                            <TableHead/>
                            <tbody>
                                <tr>
                                    <th>Question</th>
                                    <th>Organisation 1</th>
                                    <th>Organisation 2</th>
                                </tr>
                                <tr>
                                    <td><Paragraph>What types of information are available? </Paragraph><Paragraph>(e.g. is it promoting its service, success stories, health information?)</Paragraph></td>
                                    <td><FreeResponse size="paragraph" id="fr_act_3_2_3_01"/></td>
                                    <td><FreeResponse size="paragraph" id="fr_act_3_2_3_02"/></td>
                                </tr>
                                <tr>
                                    <td><Paragraph>What are your immediate thoughts about this information and has it changed your opinion of the organisation? </Paragraph><Paragraph>Do you feel that they reflect positively or negatively on the organisation?</Paragraph></td>
                                    <td><FreeResponse size="paragraph" id="fr_act_3_2_3_03"/></td>
                                    <td><FreeResponse size="paragraph" id="fr_act_3_2_3_04"/></td>
                                </tr>
                                <tr>
                                    <td><Paragraph>Why do you think you feel this way? </Paragraph><Paragraph>How would this make you feel about using the services of this organisation?</Paragraph></td>
                                    <td><FreeResponse size="paragraph" id="fr_act_3_2_3_05"/></td>
                                    <td><FreeResponse size="paragraph" id="fr_act_3_2_3_06"/></td>
                                </tr>
                                <tr>
                                    <td>If you were to make three recommendations to this organisation about their online presence what would they be?</td>
                                    <td><FreeResponse size="paragraph" id="fr_act_3_2_3_07"/></td>
                                    <td><FreeResponse size="paragraph" id="fr_act_3_2_3_08"/></td>
                                </tr>
                            </tbody>
                        </Table>
                    </Question>
                    <Discussion>
                        <Paragraph>You might have noticed the range of information available – many organisations share information about their services, staff and promote different areas of health and social care. You will find that there are lots of organisations who use Twitter and that they link with different people and other organisations using # and @ in their posts. Some organisations also have staff profiles; for example, you will find that some Open University academics have staff profiles that give some background information, research activity and academic work.</Paragraph>
                        <Paragraph>If you found user reviews about your chosen organisation, you will most likely have found a ‘mixed bag’ with some positive and some negative. You should think carefully about the reviews you read on such platforms as it is not always possible to determine the accuracy and integrity of the content. However, this type of social media is becoming increasingly popular and can give an oversight of the performance of the organisation.</Paragraph>
                    </Discussion>
                </Activity>
            </Section>
            <Section>
                <Title>2.3 The ethical debate: Googling service users and patients?</Title>
                <Paragraph>Patient (or service user) targeted Googling (PTG) is an emerging topic for debate in health and social care and involves a health and social care professional using an internet search engine to find information (such as a social media profile) about a patient in their care. In 2019, the research into this topic was mainly focused on medicine and psychiatry but it is likely this will expand into other care professions. PTG can be defined as:</Paragraph>
                <Quote>
                    <Paragraph>[the] practice of searching the internet for information about patients. Googling is used as the general term to describe internet searches using the popular search engine, Google.</Paragraph>
                    <SourceReference>(Gershengoren, 2019)</SourceReference>
                </Quote>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_blk06_topic03_f002.eps" x_printonly="y" x_folderhash="f9841e19" x_contenthash="1f42693c" x_imagesrc="k102_blk06_topic03_f002.eps.jpg" x_imagewidth="512" x_imageheight="291"/>
                </Figure>
                <Paragraph>There are a range of arguments for and against such activities. Some research suggests that there are certain circumstances where searching for patients or service users on the internet is justified (Gershengoren, 2019; Thabrew <i>et al</i>., 2018; Chester <i>et al</i>., 2017); for example, when you believe someone to be a risk to themselves or others and service user safety is of concern. On the other hand though, it could be deemed to be an invasion of privacy.</Paragraph>
                <Activity>
                    <Heading>Activity 7 Should you Google a service user?</Heading>
                    <Question>
                        <Paragraph>Do you think that it is acceptable for health and social care workers to Google service users in their care?</Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="fra7"/>
                    </Interaction>
                    <Discussion>
                        <Paragraph>Your response was likely to be informed by your background, experience and own attitudes (Ryan <i>et al</i>., 2019). </Paragraph>
                    </Discussion>
                </Activity>
                <Paragraph>The next section will discuss this further.</Paragraph>
            </Section>
            <Section>
                <Title>2.4 The ethical debate on PTG</Title>
                <Paragraph>You will have seen that there are a range of different perspectives about using internet search engines to find publicly accessible information about people. When working in health and social care it is important to put the service user at the centre of what you do and so the decisions you make about care need to be justified. In order to use the internet or social media responsibly in relation to service users, a study by Ryan <i>et al</i>. (2019) found members of the public felt that:</Paragraph>
                <BulletedList>
                    <ListItem>the act needs to be in the best interests of the patient/service user</ListItem>
                    <ListItem>curiosity is not enough to justify searching for a service user’s information</ListItem>
                    <ListItem>wherever possible, consent should be sought and documented</ListItem>
                    <ListItem>justification for the ‘search’ needs to be documented</ListItem>
                    <ListItem>ethical principles need to be considered (i.e. beneficence, maleficence, autonomy and justice).</ListItem>
                </BulletedList>
                <Paragraph>Ryan and Cornock (2019) and Ryan (2019) suggest a framework by which to consider the professional, employer, ethical and legal implications of PTG so that you can most effectively make and justify your decisions.</Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_blk06_topic03_f005.eps" x_printonly="y" x_folderhash="f9841e19" x_contenthash="4a80ab67" x_imagesrc="k102_blk06_topic03_f005.eps.jpg" x_imagewidth="512" x_imageheight="340"/>
                </Figure>
                <Paragraph>The next activity guides you to think more carefully about the searching the internet for information about service users.</Paragraph>
                <Activity>
                    <Heading>Activity 8 Making an internet search on a service user for the purpose of protection</Heading>
                    <Question>
                        <Paragraph>The following video describes the findings of a research project that examined how social workers should or should not use Facebook profiles as part of their practices in child protection. You are advised to watch this video on a full-sized monitor or laptop rather than a mobile device if possible.</Paragraph>
                        <Paragraph>This is a relatively challenging video, so don’t worry too much if you find it difficult to follow all of it. Focus on the main message, which is around the ethics of using information from social media as part of child protection assessments. As you watch this video, consider whether you think that professionals in health and social care should use social media to find information about their patients or service users.</Paragraph>
                        <Paragraph>How would you feel as a patient or service user if a professional did this to you? Make some notes about the circumstances when you think this would be appropriate.</Paragraph>
                        <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_2019j_vwr148.mp4" type="video" width="512" x_manifest="k102_2019j_vwr148_1_server_manifest.xml" x_filefolderhash="f9841e19" x_folderhash="f9841e19" x_contenthash="0b61edda" x_subtitles="k102_2019j_vwr148.srt">
                            <Caption>Video 1 Facebook: An unethical practice or effective tool in child protection?</Caption>
                            <Transcript>
                                <Speaker>TARSEM SINGH COONER</Speaker>
                                <Remark>Hello, My name is Tarsem Singh Cooner, from the University of Birmingham in the United Kingdom. And this is my colleague-- </Remark>
                                <Speaker>LIZ BEDDOE</Speaker>
                                <Remark>Liz Beddoe from the University of Auckland in New Zealand. </Remark>
                                <Speaker>TARSEM SINGH COONER</Speaker>
                                <Remark>Together we will be exploring the following topic-- the use of Facebook in social work practise with children and families, an unethical practise or an effective tool in child protection. </Remark>
                                <Speaker>LIZ BEDDOE</Speaker>
                                <Remark>In this presentation, we will be drawing from our two-year ethnographic research project that explored what can help or hinder social workers from beginning, developing, and sustaining relationships over time with children and families involved in child protection processes. </Remark>
                                <Speaker>TARSEM SINGH COONER</Speaker>
                                <Remark>This short presentation is inspired by both the data obtained in the study and the much wider debates about the impact of technology use in the wider human services fields. Our study has allowed us to observe how some social workers use Facebook as part of risk assessments and ongoing casework with families. We'll explore how their actions can be framed within these wider debates. </Remark>
                                <Speaker>LIZ BEDDOE</Speaker>
                                <Remark>We begin by exploring this topic from two ethical positions-- Kantian and utilitarian. From the perspective of our research, we consider the Kantian position to be one where there is an intrinsic principle of respect for persons. Therefore, any actions that result in a social worker deceiving or acting covertly to access the family's social media information to undertake child protection work is considered morally wrong. </Remark>
                                <Speaker>TARSEM SINGH COONER</Speaker>
                                <Remark>In contrast to Kantian ethics, from a utilitarian perspective, the moral worth-- that is, the rightness or wrongness of an action-- is set to lie in its consequences. Therefore, if accessing a parent's social media account through deceit or covert surveillance produces a good consequence, such as protecting a child from harm, then this action would be considered morally right. Here the principle of justice comes in, arguing that the right action is that which produces the greatest good to the greatest number of people-- the child, social worker, agency, and so forth. In the following segments, we will consider an ethical position, draw on quotes from our research, and then pose a question for you to consider with the aim of stimulating further debate. </Remark>
                                <Speaker>LIZ BEDDOE</Speaker>
                                <Remark>From a broadly utilitarian position, Sage and Sage argue, in a risk-focused orientation, child welfare workers should be thorough in their family assessments, exploring any resource available, including social media. Client privacy and confidentiality is seen as secondary to child safety from this lens. Using this argument, consider the following quotes about Facebook use drawn from our research. "There are some positives to it, you can find out if parents are in relationships still even when they've said they aren't." </Remark>
                                <Remark>"I know my manager had an instance once when she was a social worker. She told me she'd gone around her and done a home visit, and then checked the mum's Facebook as she was still sitting in the car outside the house. And the mother's written on Facebook, silly twat didn't even see the bag of weed down the side of the sofa-- laughing. So she's gone back in and said, oh, I forgot, and had a look down the side of the sofa." How comfortable are you with this kind of surveillance of service users? Is it acceptable to say that the end justifies the means? </Remark>
                                <Speaker>TARSEM SINGH COONER</Speaker>
                                <Remark>Thanks, Liz. Now, consider the opposite Kantian perspective. Kolmes and Taube ask, is there a difference between a practitioner physically following a client compared to following them around online? They go on to argue that the crucial differences between this analogy and the intentional searching for client information on the internet are the ease, convenience, invisibility, and inexpensive nature of the activity. We found that using Facebook can make it really easy for social workers to follow service users. But is it too much like stalking? And does this behaviour cut across the need to establish a rapport and trust in order to gain a full assessment? </Remark>
                                <Remark>Our research found that some social workers were clear about what they considered to be the right and wrong uses of Facebook in these situations. "I don't go looking them up on Facebook to see what they're up to, because I think that's an invasion of their privacy." "I personally find that morally and ethically not right. I think that, you know, everybody's got a right to a private life." But is it that simple? Consider-- is it acceptable practise to ignore possible sources of data that may well help you protect children from risk of harm? </Remark>
                                <Remark>RACHEL </Remark>
                                <Speaker>LIZ BEDDOE</Speaker>
                                <Remark>As our research progressed, we began to ask, is there a more balanced approach. Clinton, et al. Suggest a framework that takes into account the contextual nature of professionals using social media with six questions that would need to be asked prior to conducting a search on service users. These questions cover motivation, threats to the therapeutic relationship, obtaining informed consent, sharing the found information with the client, documenting findings, and an ongoing need for the practitioner to recheck their motivations for such searches. </Remark>
                                <Remark>During our research, we observed social workers engaging with some of these issues. For example-- "Because we know that when you get to court, that's when these things become unstuck, when you're questioned on information. And- well, how can you validate things? Do you know what I mean? Is an honest approach possible? How can you guarantee that anything that service users are putting on Facebook is factual? </Remark>
                                <Speaker>TARSEM SINGH COONER</Speaker>
                                <Remark>Sage, Wells, Sage and Devlin suggest strategies that can attempt to maximise confidentiality and support ethical practise. They argue that agencies can consider the viewpoints of all potential stakeholders, including community members, foster parents, youth, biological parents and relatives, social, workers supervisors, and administrators, and consider whether the proper resources are available to support and monitor policy and practise initiatives. The following quote from our research, for us, captures the dilemmas that these topics can present. </Remark>
                                <Remark>"But it's protection for ourselves as well, isn't it? At the end of the day, we don't want to be reprimanded for doing something that we shouldn't be doing. But equally, we don't want to be missing stuff where children are being put at risk. I don't know. It's a weird-- it's a weird one, isn't it?" At this point, what we question is, should the profession stop, have a think, have a debate about the types of issues that we have raised here? </Remark>
                                <Speaker>LIZ BEDDOE</Speaker>
                                <Remark>For example, we know from our study and other research that these Kantian and utilitarian practises are happening. But should we now take a metaphoric pause and consider the consequences? For example, there are current debates about governments using sophisticated algorithms to predict harm. But just because we can doesn't mean we should. In the past, social work practise has unquestionably acted in ways that we consider to be bad practise now-- for example, removing children from single parents, those with learning disabilities, and from indigenous communities. Using these lessons learned from these past experiences, we need to think through our use of social media now before social media surveillance becomes unquestioningly too institutionalised. </Remark>
                                <Speaker>TARSEM SINGH COONER</Speaker>
                                <Remark>Therefore, having viewed this presentation, what do you think of the wider issues for debate when considering, is Facebook use in social work practise for children an families an unethical practise or an effective tool in child protection? </Remark>
                            </Transcript>
                            <Figure>
                                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2723259/mod_oucontent/oucontent/100702/k102_2019j_vwr148.png" x_folderhash="f9841e19" x_contenthash="d0d659c8" x_imagesrc="k102_2019j_vwr148.png" x_imagewidth="512" x_imageheight="290"/>
                            </Figure>
                        </MediaContent>
                        <Paragraph>Revisiting the activity in the previous section, has your opinion changed?</Paragraph>
                        <Paragraph>Do you think that it is acceptable for health and social care workers to use social media to find out information about service users in their care?</Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="fra6"/>
                    </Interaction>
                    <Discussion>
                        <Paragraph>This is a relatively new area of debate and there are a range of ethical, legal and professional issues associated with using the internet to find information about service users. You might agree with such activity because anything you might find through an internet search is publicly accessible, or it might be that you feel there needs to be more awareness about what people share and how they share it.</Paragraph>
                        <Paragraph>Either way, it is important to make sure that anything you do as a professional or employee in health and social care is clearly justifiable and in the best interests of the people in your care. You should consider Beauchamp and Childress’s (1989) four components of ethics and make sure you are operating within current professional guidance, policy and procedure.</Paragraph>
                    </Discussion>
                </Activity>
            </Section>
        </Session>
        <Session>
            <Title>Conclusion</Title>
            <Paragraph>This free course, <i>Social media and networks in health and social care</i>, has invited you to explore some of the advantages and disadvantages of the internet. It discussed the risks of the internet for children and young people with developmental and intellectual disability and how this group is particularly vulnerable to certain types of online abuse such as sexual exploitation, sexual grooming, cybercrime and unhealthy relationships. This concluded with some top tips and recommendations about education of children, young people, parents, carers and professionals in this context.</Paragraph>
            <Paragraph>You have explored the role of OSNs and OSM, how to use these effectively and considered your own digital footprint in relation to these, especially in the current climate where patients and service users are able to search for health and social care professionals. The later part of this course discussed the implications of patient-targeted Googling (PTG) and the ethical debate surrounding this concept.</Paragraph>
            <Paragraph>This OpenLearn course is an adapted extract from the Open University course <a href="http://www.open.ac.uk/courses/qualifications/details/k102">K102 <i>Introducing health and social care</i></a>.</Paragraph>
        </Session>
    </Unit>
    <BackMatter>
        <References>
            <Reference>Agren, K.A., Kjellberg, A. and Hemmingsson, H. (2018) ‘Access to and use of the Internet among adolescents and young adults with intellectual disabilities in everyday settings’, <i>Journal of Intellectual &amp; Developmental Disability</i>.</Reference>
            <Reference>BBC (2014) <i>What is the internet?</i> Available at: <a href="http://www.bbc.co.uk/webwise/guides/what-is-the-internet">http://www.bbc.co.uk/webwise/guides/what-is-the-internet</a> (Accessed: 2 December 2020).</Reference>
            <Reference>Beauchamp, T.L. and Childress, J.F. (1989) <i>Principles of biomedical ethics</i>, 3rd edn. New York: Oxford University Press.</Reference>
            <Reference>Buijs, P.C.M., Boot E., Shugar, A., Fung, W.L.A. and Bassett, A.S. (2017) ‘Internet safety issues for adolescents and adults with intellectual disabilities’, <i>Journal of Applied Research in Intellectual Disability</i>, 30(2), pp. 416–18.</Reference>
            <Reference>Chester, A.N., Walthhert, S.E., Gallagher, S.J., Anderson, L.C. and Stitely, M.L. (2017) ‘Patient-targeted Googling and social media: a cross-sectional study of senior medical students’, <i>BMC Medical Ethics</i>, 18(70).</Reference>
            <Reference>Chiner, E., Gomez-Puerta, M. and Cardona-Molto, C. (2017) ‘Internet and people with intellectual disability: an approach to caregivers’ concerns, prevention strategies and training needs’, <i>Journal of New Approaches in Educational Research</i>, 6(2), pp. 153–8.</Reference>
            <Reference>Gershengoren, L. (2019) ‘Patient targeted googling and psychiatric professionals’, <i>The International Journal of Psychiatry in Medicine</i>, 54(2), pp. 133–9.</Reference>
            <Reference>Jacobs, W., Amuta, A.O. and Jeon, K.C. (2017) ‘Health information seeking in the digital age: an analysis of health information seeking behaviour among US adults’, <i>Cogent Social Sciences</i>, 3(1).</Reference>
            <Reference>Jaks, R., Baumann, I., Juvalta, S. and Dratva, J. (2019) ‘Parental digital health information seeking behaviour in Switzerland: a cross-sectional study’, <i>BMC Public Health</i>, 19(225).</Reference>
            <Reference>Moreland, J., French, T.L. and Cumming, G.P. (2015) ‘The prevalence of online health information seeking among patients in Scotland: a cross sectional exploratory study’, <i>JMIR Research Protocols</i>, 4(3).</Reference>
            <Reference>National Society for the Prevention of Cruelty to Children (2019) <i>Online abuse</i>. Available at: <a href="https://www.nspcc.org.uk/what-is-child-abuse/types-of-abuse/online-abuse/">https://www.nspcc.org.uk/what-is-child-abuse/types-of-abuse/online-abuse/</a> (Accessed: 2 December 2020).</Reference>
            <Reference>Normand, C.L. and Sallafranque-St-Louis, F. (2016) ‘Cybervictimization of young people with intellectual or developmental disability: risks specific to sexual solicitation’, <i>Journal of Applied Research in Intellectual Disability</i>, 29(2), pp. 99–110.</Reference>
            <Reference>Office for National Statistics (2019a) <i>Internet users, UK: 2019</i>. Available at: <a href="https://www.ons.gov.uk/businessindustryandtrade/itandinternetindustry/bulletins/internetusers/2019">https://www.ons.gov.uk/businessindustryandtrade/itandinternetindustry/bulletins/internetusers/2019</a> (Accessed: 2 December 2020).</Reference>
            <Reference>Office for National Statistics (2019b) <i>Internet access - households and individuals, Great Britain: 2019</i>. Available at: <a href="https://www.ons.gov.uk/peoplepopulationandcommunity/householdcharacteristics/homeinternetandsocialmediausage/bulletins/internetaccesshouseholdsandindividuals/2019">https://www.ons.gov.uk/peoplepopulationandcommunity/householdcharacteristics/homeinternetandsocialmediausage/bulletins/internetaccesshouseholdsandindividuals/2019</a> (Accessed: 2 December 2020).</Reference>
            <Reference>Ryan G.S. and Cornock M. (2019) ‘PRISM: Professional Regulation in Social Media: validation and evaluation of a decision making tool’, <i>RCN International Research Conference</i>, Sheffield Hallam University, UK, 3–5 September 2019.</Reference>
            <Reference>Ryan, G.S., Jackson, J. and Cornock, M. (2019) ‘Exploring public perspectives of e-professionalism in nursing’, <i>Nursing Management</i>, 26(6), pp. 275–91.</Reference>
            <Reference>Ryan, G.S. (2017a) <i>Online social networks and the pre-registration student nurse: a focus on professional accountability</i>. Available at: <a href="https://www.dora.dmu.ac.uk/handle/2086/16379">https://www.dora.dmu.ac.uk/handle/2086/16379</a> (Accessed: 2 December 2020).</Reference>
            <Reference>Ryan, G.S. (2017b) ‘What do nurses do in professional Facebook groups and how can we explain their behaviours’, <i>RCN International Research Conference</i>. Oxford, UK, 5–7 April 2017.</Reference>
            <Reference>Ryan, G.S. (2019) ‘e-Professionalism and nurse education’, in Dyson, S. and McCallister, M. (eds.) <i>Routledge International Handbook of Nurse Education</i>. London: Routledge.</Reference>
            <Reference>Statista (2019) <i>Global active usage penetration of leading social networks as of February 2019</i>. Available at: <a href="https://www.statista.com/statistics/274773/global-penetration-of-selected-social-media-sites/">https://www.statista.com/statistics/274773/global-penetration-of-selected-social-media-sites/</a> (Accessed: 2 December 2020).</Reference>
            <Reference>Thabrew, H., Sawyer, A. and Eischeberg, C. (2017) ‘Patient-targeted Googling by New Zealand mental health professionals: a new field of ethical consideration in the internet age’, <i>Telemedicine and e-Health</i>, 24(10), pp. 818–24.</Reference>
        </References>
        <Acknowledgements>
            <Paragraph>This free course was written by Lucy Rai.</Paragraph>
            <!--If archive course include following line: 
This free course includes adapted extracts from the course [Module title IN ITALICS]. If you are interested in this subject and want to study formally with us, you may wish to explore other courses we offer in [SUBJET AREA AND EMBEDDED LINK TO STUDY @OU].-->
            <Paragraph>Except for third party materials and otherwise stated (see <a href="http://www.open.ac.uk/conditions">terms and conditions</a>), this content is made available under a <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence</a>.</Paragraph>
            <Paragraph>The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this free course: </Paragraph>
            <Heading>Images</Heading>
            <Paragraph>Course image: © Kittichai Boonpong / Dreamstime.com</Paragraph>
            <Paragraph>Section 1.2 figure: © scyther5 / istock / Getty Images Plus</Paragraph>
            <Paragraph>Section 2 figure: © ojogabonitoo / istockphoto / Getty Images Plus</Paragraph>
            <Paragraph>Section 2.1 figure: © alexsl / istockphoto / Getty Images</Paragraph>
            <Paragraph>Section 2.3 figure: © LysenkoAlexander / iStock / Getty Images Plus</Paragraph>
            <Paragraph>Section 2.4 figure: © IvelinRadkov / istock / Getty Images Plus</Paragraph>
            <Heading>Audio-visual</Heading>
            <Paragraph>Audio 1: © The Open University</Paragraph>
            <Paragraph>Audio 2: © The Open University</Paragraph>
            <Paragraph>Audio 3: © The Open University</Paragraph>
            <Paragraph>Video 1: Used with permission from Dr Tarsem Singh Cooner</Paragraph>
            <!--The full URLs if required should the hyperlinks above break are as follows: Terms and conditions link  http://www.open.ac.uk/ conditions; Creative Commons link: http://creativecommons.org/ licenses/ by-nc-sa/ 4.0/ deed.en_GB]-->
            <Paragraph>Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.</Paragraph>
            <!--<Paragraph>Course image <EditorComment>Acknowledgements provided in production specification or by LTS-Rights</EditorComment></Paragraph>-->
            <!--<Paragraph>
        <EditorComment>Please include  further acknowledgements as provided in production specification or by LTS-Rights in following order:
Text



Images



Figures



Illustrations



Tables



AV



Interactive assets</EditorComment>
      </Paragraph>-->
            <Paragraph/>
            <Paragraph><b>Don't miss out</b></Paragraph>
            <Paragraph>If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University – <a href="http://www.open.edu/openlearn/free-courses?LKCAMPAIGN=ebook_&amp;MEDIA=ol">www.open.edu/openlearn/free-courses</a>.</Paragraph>
        </Acknowledgements>
    </BackMatter>
<settings>
    <numbering>
        <Session autonumber="false"/>
        <Section autonumber="false"/>
        <SubSection autonumber="false"/>
        <SubSubSection autonumber="false"/>
        <Activity autonumber="false"/>
        <Exercise autonumber="false"/>
        <Box autonumber="false"/>
        <CaseStudy autonumber="false"/>
        <Quote autonumber="false"/>
        <Extract autonumber="false"/>
        <Dialogue autonumber="false"/>
        <ITQ autonumber="false"/>
        <Reading autonumber="false"/>
        <StudyNote autonumber="false"/>
        <Example autonumber="false"/>
        <Verse autonumber="false"/>
        <SAQ autonumber="false"/>
        <KeyPoints autonumber="false"/>
        <ComputerDisplay autonumber="false"/>
        <ProgramListing autonumber="false"/>
        <Summary autonumber="false"/>
        <Tables autonumber="false"/>
        <Figures autonumber="false"/>
        <MediaContent autonumber="false"/>
        <Chemistry autonumber="false"/>
    </numbering>
    <discussion_alias>Discussion</discussion_alias>
    <session_prefix/>
<version>2020102004</version></settings></Item>
