Journal of Advances in Internal Medicine Editorial Underestimation of clinical importance of non-steroidal anti-inflammatory drug induced enteropathy and its exacerbation by proton pump inhibitors Umid Kumar Shrestha* Manipal College of Medical Sciences & Manipal Teaching Hospital, Pokhara, Nepal Non-steroidal anti-inflammatory drugs (NSAIDs) are commonly used over-the-counter to relieve pain and symptoms of arthritis and soft tissue inflammation. Proton pump inhibitors (PPIs) are often used simultaneously with NSAID to protect against its gastroduodenal side effects. However, the suppression of gastric acid secretion by PPIs does not seem to protect against the damage caused by NSAIDs in the more distal small intestine, often called as NSAID induced enteropathy. In fact, the small intestine seems to be more susceptible to the damaging effects of NSAIDs than the stomach1 and PPI may even exacerbate the NSAID induced enteropathy.2
Take Clomid is contraindicated in the presence of cysts in the ovaries, liver and kidney failure, the presence of pituitary tumors or genital organs Problems with impregnation The information is provided for informational purposes only and is not a guide for self .Cialis ne doit pas être prise à tous. Il est important que cialis en ligne est prescrit par un médecin, bien se familiariser avec les antécédents médicaux du patient. Ich habe Probleme mit schnellen Montage. Lesen Sie Testberichte Nahm wie cialis rezeptfrei 30 Minuten vor dem Sex, ohne Erfolg. Beginn der Arbeiten nach 4 Stunden, links ein Freund ein trauriges Ja, und Schwanz in sich selbst nicht ausstehen, wenn es keinen Wunsch ist.
Journal of African Studies in Educational Management and Leadership
Vol: 7 No:1, August 2016, 61-81
Scholarly, Peer Reviewed
Interrogating Social Media Netiquette and Online Safety among
University Students from Assorted Disciplines
Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey Abstract
Despite the convenient and compelling nature of social media, netiquette or good conduct in its use remains a remote practice. Being a primary agent of socialization, the social media is a popular means by which individuals exchange personal information, a situation that requires high morals, integrity and individual discipline to be exercised during such exchange. This study presents a mini review of university students' views of social media netiquette and online safety with particular focus on issues of practice relevant to university students in selected disciplines with a special focus on those in the health sciences departments at Kabianga University. An evolving emergent research design was engaged using the search strategy, Find It with keywords like Face book, Twitter, netiquette, patient privacy and social media, student behavior and internet. Students had what they referred to as favorite applications (apps) on social media where both personal and private issues as well as public debate and discourse were freely exchanged. Notably, with a great variety of clientele visiting such sites, unaware of their impact, there is always the danger of being misinterpreted or revealing confidentialities unknowingly. There is need therefore, to establish national and institutional policies regarding etiquette and privacy in the use of social media in public universities and health institutions. A less generic review addressing particular disciplines and circumstances is also recommended for more input regarding social media.
Keywords: Face book, University students, Twitter, Netiquette, client's privacy, Social
Contact author details: Simon Macharia Kamau, University of Kabianga, Kenya.
Despite their greater technological sophistication as compared to the general population, many young users of social media networks possess a limited Publisher: Kenya Association of Educational and Management (KAEAM) Corresponding author. Email:
ISSN 2078-7650 Online# 2016, http://www.kaeam.or.ke
2016 Kenya Association of Educational and Management (KAEAM)
62 Journal of African Studies in Educational Management and Leadership
understanding of harmful consequences of sharing information via social media. They tend to maintain lax privacy practices and take their postings for granted. Hardly do they read or consider private policies of web providers of the networks or applications they use before subscription to such social groups and networks. Social media on the other hand offers an efficient and convenient means by which to exchange personal information. Owing to the social need for inclusion among peers, the sites become a compelling attraction to numerous youths whose obvious access to relevant electronics and availability of time for engagement enhances the media use. In such circumstances, highly confidential content like medical information becomes public while professionalism and ethics of practice get compromised. Often, for medical students, it leads to posting of patient information, leading to serious, unintended, and irreversible consequences. Once one clicks ENTER that's it, it is no longer in one's control. There is therefore need for policies on these matters and medical educators need to inform students on the detriments of such medical information exposure. The Internet is no longer a futuristic technology trend. It is here already, for there is a likelihood of one using an element of it in one way or another. When optimized, such elements can make a real difference in living or give a competitive edge to users if only educators do effective sensitization. Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 63 Research Approach
This mini review; an evolving emergent design, has its foundations on grounded theory as a theory and as a research method in data collection. It is the type of study supported by Polit and Beck (2012, p. 487), who claim that an emergent design reflects on what is being learnt without hypothesizing and is not designed out of a prior theory. Furthermore, Beck (1997, p. 265) contends that at the outset, for (some) research, the state of knowledge that is known at each juncture of data collection experience is impossible to predict in terms of its trajectory. In the background of qualitative research lies volumes of individuals' opinions that are freely and unpredictably expressed; and which may contain vital data in research. In the current case, reactions to posts via Tweeter and Face book or a Chat or discussions by friends on WhatsApp may generate data that can either qualify some existing theories or produce new data that disqualifies the same. It is the voluntary comments and observations, some of which were not posted or expected by the researcher, that form the bulk of data in an emergent design. This is the very basis of grounded theory; analyzing data, getting to know the participants, generating themes, seeing questions and answers and keenly observing as old or new theories emerge. Observation was a central data collection instrument with sites like Face book, Twitter, and WhatsApp. Some of the terms critical in the research were netiquette, patient privacy, social media, student behavior +internet. The following tools were also applied in data 64 Journal of African Studies in Educational Management and Leadership
collection: observation of response to some slightly adapted coursework materials in Human Technology Interface, keeping a tab on three subscription social networking groups' sites and postings on social media: Twitter, Face book, Google+, YouTube, Instagram, Pinterest, LinkedIn and blogs. Popular social media was searched for terms and conditions for users and providers. Search on institutional policies on information technology was also done. The greatest resources were high volume platforms with possible youthful users. Regular referrals to links and hints as offered by those who got interested in posts relevant to the study were done at intervals. After visits on students' favorite sites and applications on social media, relevant data was analyzed and a draft produced. The original draft was then posted in the library notice-board in the School of Health Sciences, University of Kabianga for about four months. Substantial feedback including direct quotes was received from students in the Nursing Sciences, Environmental Health, Information Technology and Clinical Medicine disciplines. No attempt was however made to analyze for content. Concepts in social media
According to Lenhart and Madden (2007), in the Pew Internet American Life Project study on social networking and teens, a social networking site is viewed as an online location where a user can create a proﬁle and build a personal network that connects him or her to other users. It allows people with similar interests, profiles or other commonalities, to share ideas and get connected. The website knows the user's personal details like friends, likes and connections. A lot of reports have shown that social media Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 65 which includes message boards, blogs, microblogs and social networking sites tends to break down the walls of client-provider communication, improve access to information and provide a new channel for peer-to-peer communication among colleagues, consumers and family members. It also helps providers develop meaningful relationships that provide emotional support for people undergoing difficult situations in life, establish communities with similar interests, and empowers participants to achieve their objectives with online peer support. There are reports that have identified best practices recommendations for implementing wide-spread use of social media within the healthcare industry (Fierce Health, 2013). Currently, it is trendy that one connects with colleagues and gets updates about all their class work through a fan page. Many institutions (including most universities), organizations and interest groups make social media communities with social media links. Many provide links to a Facebook fan page to get frequently updated polls, photos and, links to news, and discussion issues and also get to view posts and answer questions, write blogs, feeds and connect with others. The Twitter facility especially, has a better utility value in getting up-to- the-minute information about a fast developing topic of interest. Netiquette is the correct way of using the internet. It governs what conduct is socially acceptable in an online or digital situation (Wikipedia). Though there might be variation between what is considered acceptable behavior in various professional environments, this review focused on the generic aspects as well as what concerns the health sciences. 66 Journal of African Studies in Educational Management and Leadership
Our take was that students were learning social etiquette from social internet use. The assumption was that they also have learnt to switch their thinking and behavior as users of the internet and as health professionals when dealing with patients' confidentiality. Face book as a social utility connects people with friends and others who work, study and live around them , enabling them to upload photos, share links and videos, and allow people to learn more about the people they connect with. In Face book, people poke each other through Wall: a forum for friends to post comments or insights about each other. Basically, tag is a special type
of link to someone's timeline on social media where anyone can add a link to a story and anyone, even potential foe, can tag another in anything while Links are paths of . By the time one manages to block such people (some people are unaware or may not bother) they might have siphoned so much of your personal information. Security while online
Basically, electronic dependency is well illustrated by widespread use of devices like Smartphone, Tablet, Thumb drive, iPad or a laptop, with each device serving a different or complementary purpose. One respondent explained it thus: Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 67 In case one was stolen or lost, I'm losing just the physical hardware. My data is on my office desktop and backed up to a local hard drive and to the cloud, using Carbonite or For the sake of such security, synchronizing of data becomes necessary leading to a host of security risks . Even well-meaning computer users can be their worst enemies because they fail to follow basic safety principles like; not using firewall where necessary, not updating antivirus, and not using a strong password/user's identity or user name or changing it regularly or take safety precautions like locking devices from unauthorized access while connected to a network domain or even reinforcing security by pressing a quick Windows logo key +L on the keyboard. Serious things can also happen by failing to log out because a determined hacker could access the information on your computer/mobile device if it was left unattended, or if one was negligently sharing files. One also needs to beware rogue applications (apps) on Internet. Some sites and apps that use instant personalization will have partnered with social media sites and might be able to receive your User ID and friends list when you visit them. For instance Xperia, Wordpress through Face book will receive information regarding your public profile, friends list, website, email address, groups and photos. Observing safety thus becomes individuals' responsibility though apparently majority of students hardly take such precautions or they are unaware of this fact. In keeping touch with colleagues they share information that is later distributed in such circumstances. It is clear therefore that available options are few as noted by Gitau (2013). Though Hotline gives young people the anonymity or guaranteed 68 Journal of African Studies in Educational Management and Leadership
confidentiality that most of them need (even though a referral tracking mechanism exists to follow up those linked to establish service utilization), in order to discuss otherwise embarrassing and or difficult topics, one needs to be just careful. Challenges and Issues of integrity
A major vice in social media use revolves around integrity. One Catherine Mbau, a Counselling Psychologist with Arise Counselling Services Nairobi, was quoted in EveWoman, Standard, Saturday 15th March, 2014, saying that the cyber bullies know what to say, how to say it; so that it has the right impact. In the report accompanying this, a number of Kenyan women celebrities had been targeted using the vilest of words. It usually started with a friend warning you that there is something about you that is trending online, and you go out to check the virtual environment, only to discover that you are ‘faced with a barrage of vitriol online'. Sometimes social media goes crazy over trivial or sensational issues that go viral. The term ‘go viral' is used for a rapidly spreading Internet message. More and more people go for something trending out of curiosity. The same scenario can be possible in discrediting individuals in the practice of medicine or in student relationships like during students' council elections. Though tracking can mean possibilities for identity in theft, co-locate view ‚snooping‛, view updating (even distorting) postings, block automated annotations or amended feedbacks to the subscriber, the damage is already done and blackmailers may use the same information for extortion( Gunther, 2011). More damage comes when individuals ignore warning alerts from service providers, or when hackers claim the role of service Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 69 providers. This warning message (details disguised for privacy reasons) was sent to an FB subscriber: We detected a login into your account from unrecognized device on Tuesday May13 at 9.25pm. Operating system; Windows 7. Browser IE, Location Nairobi, 110, KE ( IP this and that number). Note: Location is based on internet service provider…If this wasn't you please secure your account as someone may be accessing it. From the FB security They further caution against responding to requests to provide login information through email. Such are the issues that are either blushed aside by students or the students live in ignorance of them. Over-trusting technology does not therefore guarantee information being received as it was originally posted. To try and counteract challenges; the Kenya Government on 24th June, 2014 launched a Cyber-Security Coordination Centre to deal with escalating cyber-crime. The situation does not however seem to change things much for new tricks keep emerging (Gunther, 2008). Peer Pressure
In the research findings, many students admitted that they find more fulfillment in reading and sending hundreds of trivial and utterly dispensable messages; even from those they see frequently in F2F (face-to-face) situations, chatting or tweeting back an FOAF [friend-of-a-friend] or virtual friends site etc. Social networking sites worked because for them, especially, it is important to be visible, since there is a considerable social and peer pressure for youth to be present and to have a ‘positive' reputation on 70 Journal of African Studies in Educational Management and Leadership
such sites. Some students shared how they engage "war story" competitions to prove how they are this or that and to exonerate themselves from this and that allegation. One seasoned user was convinced that, ‘Battles can be won or lost on social media'. They would also share hints on how to get away with certain behaviors. How intimate these forums can actually get is another issue altogether. In a case of rating by exploring serious engagements in ‘sharing stuff', one youth poked another ‘… you got 5000 friends, how many inbox have you ever read from one of them?.is FB just for adding new friends so that you can be a celebrity, is socializing all there is to it?' Alongside such an insight there is more to the social exchange on media than the necessity to communicate constructive views, opinions and ideas. According to the students, young people regularly use social media to network, communicate or just to have fun. Social media and Internet for that matter make the knowledge of the world available to all and consequently deprives the teachers of their competitive advantage over their students; kind of eroding their authority. It has its fair share of negatives including trending hate speech as was witnessed during the post- election violence in Kenya in 2008 due to divergent political dispensation. Fun and entertainment and the cheer pursuit of hobbies were actually cited as carrying the bulk of social media focus among the students. This scenario is equivalent to what is presented in the world of soccer. For instance, 35.6 million real time Tweets were recorded during the telecast Semi-final 2014 FIFA World Cup match between Brazil and Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 71 Germany (results Germany 7: Brazil 1) making it the most-talked-about, most-discussed single sport ever on the social network (CBSNEWS, 07.00HRS, 9th July, 2014). Though viewed as trivial, during such seasons students may take lots of time betting, jeering the failure of opponents or cheering in jubilation on success of a team of their choice. During such moments, academics or medical practice exchange gets obscured. During academic endeavor, the same scenario is presented in medical studies. It was revealed that it was possible to share PubMed results via social media. One advertisement from Health Sciences Library ran thus: ‘<find a study you want to share on Twitter, Face book or Google+? Use PubMed's new social media sharing links! Simply search, find a result worth a share, then look for the sharing links below the abstract'. In such a case, for the entrepreneur minded, participation is meant for entrepreneurship; it's to "market" oneself. Others are for financial gains where users engage in gambling or accumulating some bonus of a Privacy Issues, Likes and Dislikes on Social Media
Some FB default settings last revised on November 15th, 2013 and available at thanks to the new ‚Graphic app‛, reveal that any person on Facebook anywhere in the world can see a profiler's ‘photos', ‚likes‛ and ‚comments‛. The policy says in part that, ‘<will be accessible to anyone who uses our APIs such as our Graph API' . Actually, API allows for unrestricted public access. Sources from Google Cloud platform indicate that even Cloud Storage can be accessed with a simple API, and one is 72 Journal of African Studies in Educational Management and Leadership
advised to add advanced features for some flexibility and power regarding what one would wish to expose or not Therefore, knowledge of such advanced features is crucial in the effective use of such For confidential information, privacy that is provided by advanced security is also not secure enough to guarantee privacy. For example, an advertisement by runs; ‘You ca n unblock popular social networking sites such as MySpace, Bebo, Face book, YouTube, Orkut, Friendster and many other sites'. Posts like‘Feel free to browse 24/7 and don't forget to tell your friends!' are common phenomena in social sites and many of the users tend to take the literal implications of such adverts with little insight into the repercussions. This was what one profiler self- updated recently. ‘My total profile views today: 132. Male Viewers 62, Female Viewers 70'. Apparently amazed, she went on to write, ‘I can't believe that you can see who viewed your Profile! One can only guess what else she might have shared in ignorance of the existing connections. However, for others, wide use and knowledge will lead them to adverts like one available atthat runs thus, ‘To See Who Visit Your Profile<'that obviously empowers the user about the openness of communication channels. Even in sites believed to be private, where profile owners may feel their audience are not public, the scenario does not change much. Given the large number of such profiler's friends/users who in-turn have other friends, this notion of privacy too is just Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 73 contextual. Still, there are the Page Administrators who may have access to insights data. Once someone is in a Group, anyone in that Group can add one to another subgroup (as invitee). One student confidentially expressed how it was possible to use tools like Jing, join-me which are free programs to record your screen and transmit a ‘live' screen to someone waiting for it on the other side. The effect can be exponential and fatal. This is this kind of scenario that makes medical school students vulnerable regarding ethics in medicine because they assume conversations are private while in actual facts they are shouting out to the world. For clients whom we serve in the various disciplines, their privacy in the media is not contextual; it is concrete, unyielding and unforgiving. If one posts something about a client (or about anything else) using a social media plug-in and one does not see a sharing icon, one should assume that the story is public. Positively, Clicking on like tab to a post might literally just mean anything from then onwards but generally what keeps the algorithm of social media alive and going is when you keep tab: like, comment or share. It increases the chance of it posting back (newsfeed) to you. Google+ offered a privacy tip that read as follows: Protect your info. Remove your email signature before you reply to a post on social media. As Mitrano (2006) asserts, as long as one goes on social media, it is to be assumed therefore that one chooses to represent themselves publicly and that one has absolutely no expectation of privacy. Indeed, BBC in the episode World Have Your Say has been running this agenda ‘Should people have the 74 Journal of African Studies in Educational Management and Leadership
right to delete online material about them?(Tue May 13, 2014 17.06 Health Sciences Students' Views
It was clear from the students' comments that social media is both convenient and compelling but medical educators had not informed students that posting patient's information may lead to serious, unintended, and irreversible long term consequences that may infringe on professional ethics in the medical field by posting of content that may violate a patient's privacy. This is unique to the fields of health care professionals, whose roles and their attendant responsibilities continue beyond the end of a shift or training session for that matter. Students were not aware of gross violations in their social media use and netiquette that might lead to dismissal from training, or later affect one's licensure and practice in the country or elsewhere as observed by Gunther (2008). Netiquette audit trail has become a reality among some potential employers where a human resource person on the hiring committee might decide to look you up on the Internet and find what they might consider ‘inappropriate posting' to discredit a candidate in an interview. Medical Ethics and Social media
Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 75 In real life situations, issues of health happen to be very personal and highly confidential in the medical practice. Certain situations leave medical staff at crossroads where a patient (or a client for that matter) might wrongly believe that a mistake had been made because they themselves misinterpreted their data, only to retract and begin clarifying the meaning and contents later. Interestingly, according to Goldman (1999) a patient has the right to control information about self, even after divulging it to others and no one should divulge protected health information. This poses challenges to potential medics because one has no control of what others do or say in instinctive response to situations. Think about this: - how can you protect a patient's privacy when they themselves posted or shared their information through social media? There is an ethical requirement to educate patients on the need to protect their own information (Freedman et al., 2009; Lucila, 2013). This is what a few students expressed: It is hard when families feel attached to you and want to keep you updated (via social media off course) on the patients progress and in turn you are curious as to how they are I worked with cancer patients for a few months and you develop such an attachment to the kids and families that it is hard to not want to stay in touch and updated'. Hospitals need to have rules against "friending" patients through social media or posting status updates with any type of identifying factors. I have issues with staff contacting patients in social media. That seems to be breaking a professional confidence. Also probably depends on who made the first contact. 76 Journal of African Studies in Educational Management and Leadership
This expresses the helplessness of students in medical practice where one has to balance between professionalism and the humane response to patients and afflicted families' distress calls that will obviously expose details of patients' illnesses. On a lighter note, one's own privacy as well as that of the patient ought to be more or less your concern too. One has to be careful about what identity they create for themselves online, how they represent others, and at the very least, be sure that they take their feelings into account. No one is too small and low profiled, to escape the attention of the ‚bad guys‛ who run cyber-attacks. They can use your posting to attack your patient, organization, institution or family. Their unfortunate victims are unaware until it is too late. Conclusion
This review article impresses upon students that online social networking sites are, in essence, broad communities with a public audience. Information that one may have posted or disclosed on the Internet often is ephemeral; enjoyed only for a short time. However, it would be good to be aware of the fact that the web is invincible, it is impossible to ignore the effects of social media on communication as identity is often permanently archived and might remain accessible long-term to others as Skiba( 2007) puts it: ‘It would be good to familiarize oneself with professional/ethical considerations as well as ethics/privacy/confidentiality laws as applied in Laws of Kenya or elsewhere like the National ICT Policy 2005, the Kenya Communications Act 1998; the Kenya Communications Regulations 2001, Kenya Communications Amendment Act (KCAA 2009), just as the US has the HITECH Act 2009. Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 77 The Kenya Information Communication Act 2012 criminalizes publishing of obscene information about a person. It would be good to know what constitutes sharing information in good faith and in which contexts. The rules governing the legal responsibilities of users and related policies and guidelines will demand caution to avoid bleach of confidentiality (Murungi, 2013). Even if consent was obtained by patients and clients or social media users, documentation may still not be legally defensible as practice like photo editing has been used to de-identify the patients through face blocking. Therefore, legal and ethical considerations in online portrayals ought to be prioritized (Freedman et al, 2009; Alana 2013) and protecting patients through good data security practice be a must . Penalties regarding malpractice can lead to investigation of reports of inappropriate disclosures on social media and if allegations are found to be true, victims can face reprimands, sanctions, fines, or temporary or permanent loss of their medical license (Logacho, 2014). Morals in such cases should be a guiding factor as one needs to think of the physical space in presentation and interpretation of the posts one makes as put by Mitrano (2006),'don't say anything about someone else that you would not want said about yourself'. Ones' health is private and a medic needs to understand that and limit sharing medical details of patients via the media. As many students' comments alluded, students of medicine need to be loyal, and uphold integrity as put by Shea, (1997) who also claims: ‚when someone makes a mistake, be kind about it. If it's a minor error, you may not 78 Journal of African Studies in Educational Management and Leadership
need to say anything. Even if you feel strongly about it, think twice before reacting. Moreover, having good manners yourself doesn't give you license to correct everyone else. Guidelines on internet safety are a must read to enhance practice . There is need to think of long term repercussions of social media use. There is need for review and development of national, university and institutional policies on social media to identify best practices since social media research is a vast field with a lot of emerging issues that constantly point to gaps in current knowledge. A similar review addressing other disciplines and circumstances would be interesting in order to enhance social media use. For individuals whether one is looking for a new job, or retaining a current position, it's important to take a few steps to ensure that everything out there including the social profile is in line with the image one wishes to project for viability in appointments and promotion. One should take down anything that does not show one in the best possible light. As an individual, one should be free to venture into the world of social media but make a deliberate choice to separate work and leisure; to use social media as a leisure activity if need be but not to debrief about work in the hospital.
Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 79 Any guidelines or advice suggested in this paper are only meant for the discussions
here in and not legal advice.
Alana A. (2013). Chicago Doctor Accused of Posting Photos of Intoxicated Patient. Abcnews Aug. 20, 2013: BeckC.(1997).Developing quantitativeapproaches. Nursing Outlook.45:265–269.
Communications Commission of Kenya (2013). ICT policy guidelines. (2013)Retrieved: The Graph API; The primary way to read and write to the Facebook social Graph. (2013, Fierce health. (2014, Feb 12). Retriev Freedman, D., Bess, K., Tucker, H., Boyd, D., Tuchman, A., Wallston, K. (2009). Public health literacy defined. American Journal of Preventive Medicine, 36 (5), 446–451. Goldman, J. (1999). in Bennett, J., Grant, R. (Eds) ‚Visions of privacy‛: Policy choices for the digital age. University of Toronto Press, Toronto; pp.97-115. Gunther Eysenbach (2008). Medicine 2.0: Social networking, collaboration, participation, apomediation, and openness. Journal of Medical Internet Research. 10(3): PMCID: PMC2626430. Available: 10.2196/jmir.1030 Gunther Eysenbach (2011). Protected health information on social networking sites:ethical and legal considerations. Journal of Medical Internet Research. Jan-Mar; 13(1): e8, Published online January 19. doi: PMCID: PMC3221358. cessed on 6th Jan, 2014 Jing a tool to record your screen, is a free program that works on both Macs &Windows PCsAccessed on 16th February, 2014. 80 Journal of African Studies in Educational Management and Leadership
Lenhart, A., Madden, M. (2007). Social networking websites and teens: An overview. Pew [Online].Available: Logacho, D. (2014). Facebook and Your Job: Tips for Nurses. Chamberlain College of Nursing. Available: Lucila Ohno-Machado (2013). Sharing data for the public good and protecting individual privacy: informatics solutions to combine different goals. Journal of Information Association. Mitrano Tracy, (2006). Thoughts on Facebook. IT policy and computer policy & law program, Murungi Michael. (2013, Sept 26-27). The Internet age and the challenge of managing personal information contained in court decisions: - Report from the law via internet conference. Retrieved: Patient Privacy: A Guide for Providers Polit, D., Beck, C. (2012). Nursing Research, Generating and Assessing Evidence for Nursing Practice. Wolters Kluwer/Lippincott Williams & Wilkins, Philadelphia Skiba Diane (2007). Nursing education 2.0: Poke me. Where's your face,Nursing
Education Perspectives.28 Slatalla, M. (2007, June 7th). ‘omg, my mom joined Facebook'. The New York Times, Simon Macharia Kamau, Khadiala Khamasi & Margaret Kamara Kosgey 81 See Who Visit your profile' (2014, Jan 6). Retrieved: US Customs & Border Protection (USCBP). (2014, March). Retrieve Xperia. (2014, Feb). ‘To Check Who loves you'. RetrievBest (2013).Retrieved: About the authors:
Mr. Simon Macharia Kamau teaches at University of Kabianga, Kericho, Kenya. Holds an MSc Nursing Leadership and Health Systems Administration (University of Colorado Denver), BSc Nursing (Moi University). He is a doctorate student health systems option at The University of Nairobi. A member of KAEAM. Online URL link: Ms. Khadiala Khamasi is currently a Masters student at Moi University School of Public Health. She has a BA in Psychology. She is interested in Qualitative research, health promotion and studies in the area of Social Networks. Ms. Margaret Kamara Kosgey is a lecturer at the University of Eldoret, School of Education. She holds a Master of Philosophy from Moi University and is currently a PhD candidate. Previously, she served as a high school teacher and deputy principal.
Examining the Truth By Terry S. Friedmann, MD, ABHM and Sabina DeVita, EdD, DNM, RNCP with Karen Boren ■ Part I: Young Living Essential Oils The company manufactures and sells the highest quali-ty essential oils available anywhere in the world. Its As Young Living Essential Oils' products, influence, products are endorsed by hundreds of medical profes-