The Ivory Tower Isn't Tweeting

Michigan State University Assistant Professor Christine Greenhow Said it's
Michigan State University Assistant Professor Christine Greenhow Said it's "troubling" that academics don't use social media to share academic work with the public in greater numbers.

If social media is the means by which organizations open dialogs and make themselves more accessible, transparent and accountable, higher education is being left behind, say two researchers from Michigan State University.

In a report published in the March 2014 issue of British Journal of Educational Technology, Christine Greenhow, an assistant professor in the College of Education, and Benjamin Gleason, a doctoral student of education, examined the use of popular social media services by academics and found their practices lacking. In a survey of 1,600 researchers, they reported that 15 percent of respondents use Twitter for professional purposes, 28 percent use YouTube and 39 percent use Facebook. The way those services are primarily used is to find collaborators and disseminate scholarly work or the work of others. It's not to reach out to students for the purposes of instruction.

Greenhow finds that "troubling," she said in a statement, since universities are trying to increase access to publicly funded research. "Only a minority of university researchers are using free and widely available social media to get their results and published insights out and into the hands of the public, even though the mission of public universities is to create knowledge that makes a difference in people's lives," she said. "Simply put, there's not much tweeting from the ivory tower."

While some faculty members are sharing their work in social media, the researchers promote the idea of universities adopting policies that reward such behaviors as it considers tenure and promotion practices. "Academia is not serving as a model of social media use or preparing future faculty to do this," said Greenhow.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • InCommon Academy in action with an Advance CAMP unconference activity at the Internet2 Technology Exchange

    Community-Driven IAM Learning with Internet2's InCommon Academy

    Internet2's InCommon Academy Director Jean Chorazyczewski examines how the academy's community-driven identity and access management learning opportunities support CIOs, IT leaders, and their IAM teams in R&E.

  • businessman juggling cubes

    Anthology Restructures, Focuses on Teaching and Learning Business

    Anthology has announced a strategic restructuring, divesting its Enterprise Operations, Lifecycle Engagement, and Student Success businesses and filing for Chapter 11 bankruptcy in an effort to right-size its finances and focus on its core teaching and learning products.

  • Jasper Halekas, instrument lead for the Analyzer for Cusp Electrons (ACE), checks final calibration. ACE was designed and built at the University of Iowa for the TRACERS mission.

    TRACERS: The University of Iowa Leads NASA-Funded Space Weather Research with Twin Satellites

    Working in tandem, the recently launched TRACERS satellites enable new measurement strategies that will produce significant data for the study of space weather. And as lead institution for the mission, the University of Iowa upholds its long-held value of bringing research collaborations together with academics.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.