SlideShare une entreprise Scribd logo
1  sur  39
JC1 CYBERWELLNESS CIVICS
PROGRAMME

   In collaboration with
NMA Cyberwellness Ambassadors
• JC1 NMA students
• Identified and researched on cyberwellness topics that suit
  the needs of youths like them
• Compiled case studies and video resources
What is Cyberwellness?
                          • Positive well-being of
                            Internet users and a
                            healthy cyber culture
                            for the Internet
                            community

• It involves an understanding of the risks of harmful
  online behavior , an awareness of how to protect
  oneself and others from such behavior, and a
  recognition of the power of the Internet to benefit
  oneself and the community at large
Objectives of today’s session
1) To create a greater awareness of social networking
   and gaming addiction
2) To empower you with ways to cope with the addictions
   and cyberbullying (arising from social networking)
3) To pledge our commitment towards building a
   healthy cyber culture via youthchaNgE Buzz
Key messages
• When used properly, the Internet has great potential to
 benefit oneself and the community at large .

• With so much information on the web that people can
 access, we need to be discerning about what we see
 and post online . All of us play a part in being
 responsible users of the Internet .

• People get addicted to social networking and
 gaming for various reasons. The most important
 thing is to be truthful to yourself, find out the root
 cause and overcome the problem . Seek help from
 family, counselors and friends .
Current situation in Singapore?
                                                                Singaporeans spend an
                                                                average of 21 hours
                                                                  online on social and
                                                                  entertainment sites



      Singaporeans are top
    Internet Users in SEA
   Singapore ranked 30th, ahead
      of other SEA countries
                                                           Source: ComScore (2009)
Top 50 Countries with highest Internet Penetration Rate,
Source: http://www.internetworldstats.com/top25.htm        http://www.comscore.com/Press_Events/Press_Releases/2009/3/First_Report
Youths are prolific Internet users!
• Individual Internet Usage by Age Group, 2010


                 Age group                                 Internet usage
                7 to 14 years                                     97%
               15 to 24 years                                     98%
               25 to 34 years                                     96%
               35 to 49 years                                     79%
               50 to 59 years                                     45%
              60 years & above                                    14%



          IDA Annual Survey on Infocomm Usage ih Households and by Individuals 2010. Source:

          http://www.ida.gov.sg/Publications/20070822125451.aspx#usageHse4
Social Networking Addiction
• Internet has become
 the main source of     26 Jun 2012
 entertainment and
 leisure for youths


           6 Feb 2011
Social Networking Addiction
• Excessive amount of time spent on
  social networking services

 • Constant
    • checking of status updates
    • browsing social profiles, photographs, postings of other
      users
    • sharing of personal happenings online (check- ins,
      update status many times within an hour etc)

 • Feel frustrated when you are unable to access your social
   networking accounts
12 Jan 2012




              New brain scan study found more
              patterns of "abnormal white matter" on
              brain scans of Internet addicts, compared
              with scans of non-addicts.

              These changes showed evidence of
              disrupting pathways related to
              emotions, decision-making, and
              self control.
Why are social networking sites
addictive?



                                              Easy to access via
                                               internet-enabled
                                                    devices

  Provide (sometimes)
false sense of belonging
  within a social circle




                           Human nature; Curiosity
…..      What are the dangers of social
  …
           networking sites?

• Oversharing of personal information
  • Befriending online friends who may have malicious intent
  • Impersonation such as creation of fake accounts
  • Stalking and invasion of privacy
  • Crime-prone
   (http://www.razor.tv/site/servlet/segment/main/currentaffairs/59880.html)



• Online love scams/sexting
  • Emotional and psychological hurt
…..      What are considered irresponsible
 …
          behaviours on the Internet?

• Cyberbullying
 • Posting comments or remarks that may offend the other
   users unintentionally
 • Sharing of humiliating photographs or videos of friends


• Posting of insensitive comments
 • Comments that incite religious/racial unrest
Case Study 1 (Cyberbullying)
• Girl, 16, falls to death in cyber-bully tragedy
• The New Paper | 7 Apr 2011


• First case of cyber-bullying death in Singapore
• A Myanmar girl killed herself after her jilted boyfriend posted
  bad comments of her on Facebook .
• The Secondary 3 student at Pioneer Secondary School
  jumped off her Pasir Ris block.

        Watch the video “The Cyberbullying Virus”
               Are you a carrier or a victim?
 https://www.youtube.com/watch?feature=player_embedded&v=-5PZ_Bh-M6o
Case Study 2 (Sexting)
        6 May 2012




                         Love scams involving sexting
                             (online dating video
                               by NMA students)
                            https://www.youtube.com/watch?
                            v=lHmp4TB7hfg&feature=player_embedded
Case Study 3 (Insensitive comments)
       1 July 2012
…..        What irresponsible cyber
  …
             behaviour can get you into…
                                      edition
• You will be charged under S___________ Act
   • Words, oral or written, or act that can bring hatred, raise discontent,
     promote feelings of ill will and hostility
                                  efamation
• You will be charged under D___________ Act
   • Slander and libel
   • Causing damage with words that are published in writing or other
     permanent form
                                     opyright
• You will be charged under C___________ Act
   • Publication or reproduction of works without the consent of the
     original owner
   • Publication or reproduction must meet the respective source’s
     guidelines
How ugly the Internet can get…
• Xiaxue could get sued for
           Copyright infringement and defamation
• The Straits Times | 9 Jun 2012

• In her blog post “The Face of Haters”, Xia Xue named and shamed her
  critics for insinuating that she and her friends are prostitutes
            Both parties are victims.
• She went to the men’s Facebook pages, took their photos and
  personal information, and re-posted them on her blog , said to
          But the way Xiaxue retaliated
  be viewed by some 40,000 people daily.
• She insulted the men for their lack of civility and unflattering
          got her into trouble instead.
  appearance. Some photos included the men with their wives and
  children.

• Lawyers said the 28-year-old blogger, whose real name is
  Wendy Cheng, could be liable to be sued for copyright
  infringement.
• While the photos she used were publicly accessible, she had
  published them without the copyright owners’ consent.
• She could also be sued for civil defamation.
“It is my account. I post
       anything I want.
         I am entitled to it.”
       What do you post on your social network
…..
…      such as Facebook, Twitter, blogs etc?
       Do you think your comments have the
       potential to offend others?

       How will what you posted in the
…..    cyberworld have an impact on your future
…
       prospects in seeking employment, further
       studies or even your personal life?
Forbes | May 3 2012
Can Facebook harm your job prospects?
• Employers can
 • look at your photos, status updates, and
   conversations with friends (public information)
 • judge you on your degree of emotionally
   stability, conscientiousness, extroversion,
   intellectual curiosity and agreeableness
How to manage social networking
addiction and issues arising from it?
  Track how much
  time you spend
  online
                           Be discerning about
                           what you read/post
                                  online

                         Stop Bullying.
                      Keep a record of all evidence
    Keep personal            Speak Up!
    profile private
Gaming
Addiction
What is Gaming Addiction?
• Excessive amount of time spent on game playing
• Lead to negative outcomes such as




 Insomnia

                     Declining school performance

     Health issues                                  Neglecting social life
Why are games so addictive?
Beautiful graphics
/avatar



                          Social platform




Cool sound effects     Sense of
                     achievement/
                     Intellectually
Most Addictive of them all?
• MMORPGs or Massively Multiplayer Online Role
  Playing Games or virtual world games
• Popular MMORPGs in Singapore include
 • Maplestory
 • World of Warcraft
 • Blackshot
 • Gunz
 • Mincraft
 • Audition
Are you an addict?   Gaming Addiction Video
7 Feb 2012
17 Oct 2011




• Married couple left their infant alone to die of
  malnutrition while they raise a virtual child
• Teenage boy killed his mother because she tried
  to stop him from playing online games.
• Young man collapsed and died following an online
  gaming session that lasted several days.
6 Apr 2012




• Cinderella Law, under Juvenile Protection Act
• Prevents those under the age of 16 from
  playing online games past midnight (through
  technical and other measures)
• Went into effect in November 2011
How to curb gaming addiction?




                                Spend time with family and friends




Time management skills
 Set reasonable limits on how
much time to spend on playing      Engage in other activities
Buzz
…..
      What kind of values would we, as a
…     class, like to see on the online
      community?
                    Or

…..   What are the irresponsible online
…     behaviours we want to put a stop to?
• Go to http://www.nma.sg/youthchange/
• Navigate to the right panel, look for “youthchaNgE Buzz”

                                  1) Click on “youth” to input
                                     your class name eg.
                                     1255B
                                  2) Type the question that you
                                     are responding to
                                  - What kind of values
                                     would we like to see
                                     on the online
                                     community? OR
                                  - What are the
   Example of a post
                                     irresponsible online
                                     behaviours we want to
                                     put a stop to?

                                  3) Type your response after
                                      the question and click on
The Internet Community Shared Values
• The Asia Internet Coalition has recently developed a set of
  shared values for the online community
• Do you know what they are?
What are the shared values?
• Respect for   Diversity
  • Refrain from hate speech which
    attacks or demeans a group based
    on race or ethnic origin, religion,
    disability, gender, age, sexual
    orientation or gender identity




                                          •Respect for the Young
                                          • Cyber bullying has no place in
                                            society, where online or offline.
What are the shared values?
•Respect for Privacy
 • Keep personal information of oneself
   and others private
 • Remove content if you receive
   complaints about it
 • Be civil and avoid flaming, trolling and
   other negative behaviors

                                  •  Respect   for Copyright
                                     • Everyone has a role to play
                                     • Refrain from uploading and sharing
                                      copyright content without necessary
                                      permission or authorizations
Are you an addict?




Self-test for Internet and Related Addictions
       http://www.netaddiction.com/index.php?
       option=com_content&view=article&id=64&Itemid=
       88
If you need help…
• Ms Lisa Lee (Full Time School
Counsellor) – Ext. 891

• Mr Adam (Part Time School
Counsellor) – Ext. 594

Contenu connexe

Tendances

Social Media Presentation for Teens 2015
Social Media Presentation for Teens 2015Social Media Presentation for Teens 2015
Social Media Presentation for Teens 2015Myeisha Hutchinson
 
Side Effects of Social Media
Side Effects of Social MediaSide Effects of Social Media
Side Effects of Social MediaAniket Maithani
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controlsMarc Vael
 
Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentationJosep Claret
 
Assignment 8 draft 3
Assignment 8   draft 3Assignment 8   draft 3
Assignment 8 draft 3ksumbland
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
Vtc2013 digital citizenship
Vtc2013 digital citizenshipVtc2013 digital citizenship
Vtc2013 digital citizenshipClint Hamada
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangersrangashree
 
Cyber bullying and internet addiction
Cyber bullying and internet addictionCyber bullying and internet addiction
Cyber bullying and internet addictionJeromeIsturis
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarinjarin651
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...Stephen Carrick-Davies
 
Assignment 8 draft 2
Assignment 8   draft 2Assignment 8   draft 2
Assignment 8 draft 2ksumbland
 
The future of_social_addictions
The future of_social_addictionsThe future of_social_addictions
The future of_social_addictionsDaniel Petrov
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 

Tendances (20)

Social Media Presentation for Teens 2015
Social Media Presentation for Teens 2015Social Media Presentation for Teens 2015
Social Media Presentation for Teens 2015
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Side Effects of Social Media
Side Effects of Social MediaSide Effects of Social Media
Side Effects of Social Media
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentation
 
Assignment 8 draft 3
Assignment 8   draft 3Assignment 8   draft 3
Assignment 8 draft 3
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
Vtc2013 digital citizenship
Vtc2013 digital citizenshipVtc2013 digital citizenship
Vtc2013 digital citizenship
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
Internet Safety for Educators
Internet Safety for EducatorsInternet Safety for Educators
Internet Safety for Educators
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Cyber bullying and internet addiction
Cyber bullying and internet addictionCyber bullying and internet addiction
Cyber bullying and internet addiction
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarin
 
Digital Tattoo for Parents
Digital Tattoo for ParentsDigital Tattoo for Parents
Digital Tattoo for Parents
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...
 
Assignment 8 draft 2
Assignment 8   draft 2Assignment 8   draft 2
Assignment 8 draft 2
 
The future of_social_addictions
The future of_social_addictionsThe future of_social_addictions
The future of_social_addictions
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 

En vedette

Exposure Lecture 2014 - Literature
Exposure Lecture 2014 - LiteratureExposure Lecture 2014 - Literature
Exposure Lecture 2014 - Literaturemediaplaylab
 
Descascar letroca 03
Descascar letroca 03Descascar letroca 03
Descascar letroca 03sansampa
 
Teaching disgrace using Second Life
Teaching disgrace using Second LifeTeaching disgrace using Second Life
Teaching disgrace using Second Lifemediaplaylab
 
Formulare De Feedback In Gdocs
Formulare De Feedback In GdocsFormulare De Feedback In Gdocs
Formulare De Feedback In Gdocsdianaifrim
 
Corinthians letroca 8 5A
Corinthians letroca 8 5ACorinthians letroca 8 5A
Corinthians letroca 8 5Asansampa
 
Letroca 07
Letroca 07Letroca 07
Letroca 07sansampa
 
Real Research in School
Real Research in SchoolReal Research in School
Real Research in SchoolGlen Gilchrist
 
Queen Hatshep and Ramses
Queen Hatshep and RamsesQueen Hatshep and Ramses
Queen Hatshep and Ramsesfreealan
 
Ignore the "Experts": Using Social Media to Build Influence Naturally
Ignore the "Experts": Using Social Media to Build Influence NaturallyIgnore the "Experts": Using Social Media to Build Influence Naturally
Ignore the "Experts": Using Social Media to Build Influence NaturallyAaron Hockley
 
Solidariedade letroca 16
Solidariedade letroca 16Solidariedade letroca 16
Solidariedade letroca 16sansampa
 
Vwbpe presentation slides (final)
Vwbpe presentation slides (final)Vwbpe presentation slides (final)
Vwbpe presentation slides (final)mediaplaylab
 
C:\Fakepath\Information Literacy Hw5
C:\Fakepath\Information Literacy  Hw5C:\Fakepath\Information Literacy  Hw5
C:\Fakepath\Information Literacy Hw5王耀慶
 
Desitara-optimized-seo-plan-for-desitara-by-Shyam-Swaraj
Desitara-optimized-seo-plan-for-desitara-by-Shyam-SwarajDesitara-optimized-seo-plan-for-desitara-by-Shyam-Swaraj
Desitara-optimized-seo-plan-for-desitara-by-Shyam-SwarajEventXP
 
Sabedoria letroca 17
Sabedoria letroca 17Sabedoria letroca 17
Sabedoria letroca 17sansampa
 

En vedette (20)

Exposure Lecture 2014 - Literature
Exposure Lecture 2014 - LiteratureExposure Lecture 2014 - Literature
Exposure Lecture 2014 - Literature
 
Descascar letroca 03
Descascar letroca 03Descascar letroca 03
Descascar letroca 03
 
Interactive scotland mobile apps event
Interactive scotland   mobile apps eventInteractive scotland   mobile apps event
Interactive scotland mobile apps event
 
Teaching disgrace using Second Life
Teaching disgrace using Second LifeTeaching disgrace using Second Life
Teaching disgrace using Second Life
 
Guía Stars 2016
Guía Stars 2016Guía Stars 2016
Guía Stars 2016
 
Formulare De Feedback In Gdocs
Formulare De Feedback In GdocsFormulare De Feedback In Gdocs
Formulare De Feedback In Gdocs
 
Corinthians letroca 8 5A
Corinthians letroca 8 5ACorinthians letroca 8 5A
Corinthians letroca 8 5A
 
Letroca 07
Letroca 07Letroca 07
Letroca 07
 
Real Research in School
Real Research in SchoolReal Research in School
Real Research in School
 
Beyond the Mean
Beyond the MeanBeyond the Mean
Beyond the Mean
 
Queen Hatshep and Ramses
Queen Hatshep and RamsesQueen Hatshep and Ramses
Queen Hatshep and Ramses
 
EPIC Plan Marketing
EPIC Plan MarketingEPIC Plan Marketing
EPIC Plan Marketing
 
Ignore the "Experts": Using Social Media to Build Influence Naturally
Ignore the "Experts": Using Social Media to Build Influence NaturallyIgnore the "Experts": Using Social Media to Build Influence Naturally
Ignore the "Experts": Using Social Media to Build Influence Naturally
 
Solidariedade letroca 16
Solidariedade letroca 16Solidariedade letroca 16
Solidariedade letroca 16
 
Vwbpe presentation slides (final)
Vwbpe presentation slides (final)Vwbpe presentation slides (final)
Vwbpe presentation slides (final)
 
C:\Fakepath\Information Literacy Hw5
C:\Fakepath\Information Literacy  Hw5C:\Fakepath\Information Literacy  Hw5
C:\Fakepath\Information Literacy Hw5
 
WTI - Recreational cycling and social media workshop slides
WTI - Recreational cycling and social media workshop slidesWTI - Recreational cycling and social media workshop slides
WTI - Recreational cycling and social media workshop slides
 
Desitara-optimized-seo-plan-for-desitara-by-Shyam-Swaraj
Desitara-optimized-seo-plan-for-desitara-by-Shyam-SwarajDesitara-optimized-seo-plan-for-desitara-by-Shyam-Swaraj
Desitara-optimized-seo-plan-for-desitara-by-Shyam-Swaraj
 
Sabedoria letroca 17
Sabedoria letroca 17Sabedoria letroca 17
Sabedoria letroca 17
 
Business Storytelling & Social Media Workshops March 2011
Business Storytelling & Social Media Workshops March 2011Business Storytelling & Social Media Workshops March 2011
Business Storytelling & Social Media Workshops March 2011
 

Similaire à Character Development, for students, by students!

Digital drama
Digital dramaDigital drama
Digital dramaktcole
 
Digital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeClaudia Megele
 
Media presentation
Media presentationMedia presentation
Media presentationweberjoel
 
Madison and amber powerpoint
Madison and amber powerpointMadison and amber powerpoint
Madison and amber powerpointMadison Emelia
 
Media presentation
Media presentationMedia presentation
Media presentationweberjoel
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parentsbermandry
 
SNS_and_Its_impact_on_Indian_Youth_ppt.ppt
SNS_and_Its_impact_on_Indian_Youth_ppt.pptSNS_and_Its_impact_on_Indian_Youth_ppt.ppt
SNS_and_Its_impact_on_Indian_Youth_ppt.pptSourabh Alawa
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016Kathryn White
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011Tea Teić
 
Social Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media AddictionSocial Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media AddictionSriram Ruthiran
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Bullying-and-Cyberbullying-A-Community-Concern-PowerPoint-Presentation (1).pptx
Bullying-and-Cyberbullying-A-Community-Concern-PowerPoint-Presentation (1).pptxBullying-and-Cyberbullying-A-Community-Concern-PowerPoint-Presentation (1).pptx
Bullying-and-Cyberbullying-A-Community-Concern-PowerPoint-Presentation (1).pptxAsthaShukla40
 

Similaire à Character Development, for students, by students! (20)

Digital drama
Digital dramaDigital drama
Digital drama
 
Digital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE Programme
 
Media presentation
Media presentationMedia presentation
Media presentation
 
Madison and amber powerpoint
Madison and amber powerpointMadison and amber powerpoint
Madison and amber powerpoint
 
Media presentation
Media presentationMedia presentation
Media presentation
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parents
 
SNS_and_Its_impact_on_Indian_Youth_ppt.ppt
SNS_and_Its_impact_on_Indian_Youth_ppt.pptSNS_and_Its_impact_on_Indian_Youth_ppt.ppt
SNS_and_Its_impact_on_Indian_Youth_ppt.ppt
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Social Network
Social NetworkSocial Network
Social Network
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Safer internet
Safer internetSafer internet
Safer internet
 
Social Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media AddictionSocial Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media Addiction
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Bullying-and-Cyberbullying-A-Community-Concern-PowerPoint-Presentation (1).pptx
Bullying-and-Cyberbullying-A-Community-Concern-PowerPoint-Presentation (1).pptxBullying-and-Cyberbullying-A-Community-Concern-PowerPoint-Presentation (1).pptx
Bullying-and-Cyberbullying-A-Community-Concern-PowerPoint-Presentation (1).pptx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Plus de mediaplaylab

Exposure Lecture 2014 - Tamil Language
Exposure Lecture 2014 - Tamil LanguageExposure Lecture 2014 - Tamil Language
Exposure Lecture 2014 - Tamil Languagemediaplaylab
 
Addiction to social networking and smartphone apps
Addiction to social networking and smartphone appsAddiction to social networking and smartphone apps
Addiction to social networking and smartphone appsmediaplaylab
 
Connecting with the world
Connecting with the world Connecting with the world
Connecting with the world mediaplaylab
 
Ratings made simple edited
Ratings made simple editedRatings made simple edited
Ratings made simple editedmediaplaylab
 
Total Defence ''It's MY Turn'' as We Remember Dr Toh Chin Chye and his contri...
Total Defence ''It's MY Turn'' as We Remember Dr Toh Chin Chye and his contri...Total Defence ''It's MY Turn'' as We Remember Dr Toh Chin Chye and his contri...
Total Defence ''It's MY Turn'' as We Remember Dr Toh Chin Chye and his contri...mediaplaylab
 
NMiEF 2011 - Toy or Tool: Using Mobile Devices & QR (Quick Response) Codes i...
NMiEF 2011 -  Toy or Tool: Using Mobile Devices & QR (Quick Response) Codes i...NMiEF 2011 -  Toy or Tool: Using Mobile Devices & QR (Quick Response) Codes i...
NMiEF 2011 - Toy or Tool: Using Mobile Devices & QR (Quick Response) Codes i...mediaplaylab
 
Teaching disgrace using Second Life
Teaching disgrace using Second LifeTeaching disgrace using Second Life
Teaching disgrace using Second Lifemediaplaylab
 
COE presentation April 2010
COE presentation April 2010COE presentation April 2010
COE presentation April 2010mediaplaylab
 
Second Life user guide
Second Life user guideSecond Life user guide
Second Life user guidemediaplaylab
 
New Media in education
New Media in educationNew Media in education
New Media in educationmediaplaylab
 
Developing the Five Minds of the Future in Second Life
Developing the Five Minds of the Future in Second LifeDeveloping the Five Minds of the Future in Second Life
Developing the Five Minds of the Future in Second Lifemediaplaylab
 
Media Education In Tikkurila Upper Secondary School
Media Education In Tikkurila Upper Secondary SchoolMedia Education In Tikkurila Upper Secondary School
Media Education In Tikkurila Upper Secondary Schoolmediaplaylab
 
Learning with Quest Atlantis in Singapore
Learning with Quest Atlantis in SingaporeLearning with Quest Atlantis in Singapore
Learning with Quest Atlantis in Singaporemediaplaylab
 
Video Paper Builder
Video Paper BuilderVideo Paper Builder
Video Paper Buildermediaplaylab
 
Have You Facebooked Today
Have You Facebooked TodayHave You Facebooked Today
Have You Facebooked Todaymediaplaylab
 

Plus de mediaplaylab (16)

Exposure Lecture 2014 - Tamil Language
Exposure Lecture 2014 - Tamil LanguageExposure Lecture 2014 - Tamil Language
Exposure Lecture 2014 - Tamil Language
 
Addiction to social networking and smartphone apps
Addiction to social networking and smartphone appsAddiction to social networking and smartphone apps
Addiction to social networking and smartphone apps
 
Connecting with the world
Connecting with the world Connecting with the world
Connecting with the world
 
Ratings made simple edited
Ratings made simple editedRatings made simple edited
Ratings made simple edited
 
Total Defence ''It's MY Turn'' as We Remember Dr Toh Chin Chye and his contri...
Total Defence ''It's MY Turn'' as We Remember Dr Toh Chin Chye and his contri...Total Defence ''It's MY Turn'' as We Remember Dr Toh Chin Chye and his contri...
Total Defence ''It's MY Turn'' as We Remember Dr Toh Chin Chye and his contri...
 
Singapore Lecture
Singapore LectureSingapore Lecture
Singapore Lecture
 
NMiEF 2011 - Toy or Tool: Using Mobile Devices & QR (Quick Response) Codes i...
NMiEF 2011 -  Toy or Tool: Using Mobile Devices & QR (Quick Response) Codes i...NMiEF 2011 -  Toy or Tool: Using Mobile Devices & QR (Quick Response) Codes i...
NMiEF 2011 - Toy or Tool: Using Mobile Devices & QR (Quick Response) Codes i...
 
Teaching disgrace using Second Life
Teaching disgrace using Second LifeTeaching disgrace using Second Life
Teaching disgrace using Second Life
 
COE presentation April 2010
COE presentation April 2010COE presentation April 2010
COE presentation April 2010
 
Second Life user guide
Second Life user guideSecond Life user guide
Second Life user guide
 
New Media in education
New Media in educationNew Media in education
New Media in education
 
Developing the Five Minds of the Future in Second Life
Developing the Five Minds of the Future in Second LifeDeveloping the Five Minds of the Future in Second Life
Developing the Five Minds of the Future in Second Life
 
Media Education In Tikkurila Upper Secondary School
Media Education In Tikkurila Upper Secondary SchoolMedia Education In Tikkurila Upper Secondary School
Media Education In Tikkurila Upper Secondary School
 
Learning with Quest Atlantis in Singapore
Learning with Quest Atlantis in SingaporeLearning with Quest Atlantis in Singapore
Learning with Quest Atlantis in Singapore
 
Video Paper Builder
Video Paper BuilderVideo Paper Builder
Video Paper Builder
 
Have You Facebooked Today
Have You Facebooked TodayHave You Facebooked Today
Have You Facebooked Today
 

Dernier

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Dernier (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Character Development, for students, by students!

  • 1. JC1 CYBERWELLNESS CIVICS PROGRAMME In collaboration with
  • 2. NMA Cyberwellness Ambassadors • JC1 NMA students • Identified and researched on cyberwellness topics that suit the needs of youths like them • Compiled case studies and video resources
  • 3. What is Cyberwellness? • Positive well-being of Internet users and a healthy cyber culture for the Internet community • It involves an understanding of the risks of harmful online behavior , an awareness of how to protect oneself and others from such behavior, and a recognition of the power of the Internet to benefit oneself and the community at large
  • 4. Objectives of today’s session 1) To create a greater awareness of social networking and gaming addiction 2) To empower you with ways to cope with the addictions and cyberbullying (arising from social networking) 3) To pledge our commitment towards building a healthy cyber culture via youthchaNgE Buzz
  • 5. Key messages • When used properly, the Internet has great potential to benefit oneself and the community at large . • With so much information on the web that people can access, we need to be discerning about what we see and post online . All of us play a part in being responsible users of the Internet . • People get addicted to social networking and gaming for various reasons. The most important thing is to be truthful to yourself, find out the root cause and overcome the problem . Seek help from family, counselors and friends .
  • 6. Current situation in Singapore? Singaporeans spend an average of 21 hours online on social and entertainment sites Singaporeans are top Internet Users in SEA Singapore ranked 30th, ahead of other SEA countries Source: ComScore (2009) Top 50 Countries with highest Internet Penetration Rate, Source: http://www.internetworldstats.com/top25.htm http://www.comscore.com/Press_Events/Press_Releases/2009/3/First_Report
  • 7. Youths are prolific Internet users! • Individual Internet Usage by Age Group, 2010 Age group Internet usage 7 to 14 years 97% 15 to 24 years 98% 25 to 34 years 96% 35 to 49 years 79% 50 to 59 years 45% 60 years & above 14% IDA Annual Survey on Infocomm Usage ih Households and by Individuals 2010. Source: http://www.ida.gov.sg/Publications/20070822125451.aspx#usageHse4
  • 8.
  • 9. Social Networking Addiction • Internet has become the main source of 26 Jun 2012 entertainment and leisure for youths 6 Feb 2011
  • 10. Social Networking Addiction • Excessive amount of time spent on social networking services • Constant • checking of status updates • browsing social profiles, photographs, postings of other users • sharing of personal happenings online (check- ins, update status many times within an hour etc) • Feel frustrated when you are unable to access your social networking accounts
  • 11. 12 Jan 2012 New brain scan study found more patterns of "abnormal white matter" on brain scans of Internet addicts, compared with scans of non-addicts. These changes showed evidence of disrupting pathways related to emotions, decision-making, and self control.
  • 12. Why are social networking sites addictive? Easy to access via internet-enabled devices Provide (sometimes) false sense of belonging within a social circle Human nature; Curiosity
  • 13. ….. What are the dangers of social … networking sites? • Oversharing of personal information • Befriending online friends who may have malicious intent • Impersonation such as creation of fake accounts • Stalking and invasion of privacy • Crime-prone (http://www.razor.tv/site/servlet/segment/main/currentaffairs/59880.html) • Online love scams/sexting • Emotional and psychological hurt
  • 14. ….. What are considered irresponsible … behaviours on the Internet? • Cyberbullying • Posting comments or remarks that may offend the other users unintentionally • Sharing of humiliating photographs or videos of friends • Posting of insensitive comments • Comments that incite religious/racial unrest
  • 15. Case Study 1 (Cyberbullying) • Girl, 16, falls to death in cyber-bully tragedy • The New Paper | 7 Apr 2011 • First case of cyber-bullying death in Singapore • A Myanmar girl killed herself after her jilted boyfriend posted bad comments of her on Facebook . • The Secondary 3 student at Pioneer Secondary School jumped off her Pasir Ris block. Watch the video “The Cyberbullying Virus” Are you a carrier or a victim? https://www.youtube.com/watch?feature=player_embedded&v=-5PZ_Bh-M6o
  • 16. Case Study 2 (Sexting) 6 May 2012 Love scams involving sexting (online dating video by NMA students) https://www.youtube.com/watch? v=lHmp4TB7hfg&feature=player_embedded
  • 17. Case Study 3 (Insensitive comments) 1 July 2012
  • 18. ….. What irresponsible cyber … behaviour can get you into… edition • You will be charged under S___________ Act • Words, oral or written, or act that can bring hatred, raise discontent, promote feelings of ill will and hostility efamation • You will be charged under D___________ Act • Slander and libel • Causing damage with words that are published in writing or other permanent form opyright • You will be charged under C___________ Act • Publication or reproduction of works without the consent of the original owner • Publication or reproduction must meet the respective source’s guidelines
  • 19. How ugly the Internet can get… • Xiaxue could get sued for Copyright infringement and defamation • The Straits Times | 9 Jun 2012 • In her blog post “The Face of Haters”, Xia Xue named and shamed her critics for insinuating that she and her friends are prostitutes Both parties are victims. • She went to the men’s Facebook pages, took their photos and personal information, and re-posted them on her blog , said to But the way Xiaxue retaliated be viewed by some 40,000 people daily. • She insulted the men for their lack of civility and unflattering got her into trouble instead. appearance. Some photos included the men with their wives and children. • Lawyers said the 28-year-old blogger, whose real name is Wendy Cheng, could be liable to be sued for copyright infringement. • While the photos she used were publicly accessible, she had published them without the copyright owners’ consent. • She could also be sued for civil defamation.
  • 20. “It is my account. I post anything I want. I am entitled to it.” What do you post on your social network ….. … such as Facebook, Twitter, blogs etc? Do you think your comments have the potential to offend others? How will what you posted in the ….. cyberworld have an impact on your future … prospects in seeking employment, further studies or even your personal life?
  • 21. Forbes | May 3 2012
  • 22. Can Facebook harm your job prospects? • Employers can • look at your photos, status updates, and conversations with friends (public information) • judge you on your degree of emotionally stability, conscientiousness, extroversion, intellectual curiosity and agreeableness
  • 23. How to manage social networking addiction and issues arising from it? Track how much time you spend online Be discerning about what you read/post online Stop Bullying. Keep a record of all evidence Keep personal Speak Up! profile private
  • 25. What is Gaming Addiction? • Excessive amount of time spent on game playing • Lead to negative outcomes such as Insomnia Declining school performance Health issues Neglecting social life
  • 26. Why are games so addictive? Beautiful graphics /avatar Social platform Cool sound effects Sense of achievement/ Intellectually
  • 27. Most Addictive of them all? • MMORPGs or Massively Multiplayer Online Role Playing Games or virtual world games • Popular MMORPGs in Singapore include • Maplestory • World of Warcraft • Blackshot • Gunz • Mincraft • Audition
  • 28. Are you an addict? Gaming Addiction Video
  • 30. 17 Oct 2011 • Married couple left their infant alone to die of malnutrition while they raise a virtual child • Teenage boy killed his mother because she tried to stop him from playing online games. • Young man collapsed and died following an online gaming session that lasted several days.
  • 31. 6 Apr 2012 • Cinderella Law, under Juvenile Protection Act • Prevents those under the age of 16 from playing online games past midnight (through technical and other measures) • Went into effect in November 2011
  • 32. How to curb gaming addiction? Spend time with family and friends Time management skills Set reasonable limits on how much time to spend on playing Engage in other activities
  • 33. Buzz ….. What kind of values would we, as a … class, like to see on the online community? Or ….. What are the irresponsible online … behaviours we want to put a stop to?
  • 34. • Go to http://www.nma.sg/youthchange/ • Navigate to the right panel, look for “youthchaNgE Buzz” 1) Click on “youth” to input your class name eg. 1255B 2) Type the question that you are responding to - What kind of values would we like to see on the online community? OR - What are the Example of a post irresponsible online behaviours we want to put a stop to? 3) Type your response after the question and click on
  • 35. The Internet Community Shared Values • The Asia Internet Coalition has recently developed a set of shared values for the online community • Do you know what they are?
  • 36. What are the shared values? • Respect for Diversity • Refrain from hate speech which attacks or demeans a group based on race or ethnic origin, religion, disability, gender, age, sexual orientation or gender identity •Respect for the Young • Cyber bullying has no place in society, where online or offline.
  • 37. What are the shared values? •Respect for Privacy • Keep personal information of oneself and others private • Remove content if you receive complaints about it • Be civil and avoid flaming, trolling and other negative behaviors •  Respect for Copyright • Everyone has a role to play • Refrain from uploading and sharing copyright content without necessary permission or authorizations
  • 38. Are you an addict? Self-test for Internet and Related Addictions http://www.netaddiction.com/index.php? option=com_content&view=article&id=64&Itemid= 88
  • 39. If you need help… • Ms Lisa Lee (Full Time School Counsellor) – Ext. 891 • Mr Adam (Part Time School Counsellor) – Ext. 594

Notes de l'éditeur

  1. Briefly go through
  2. Briefly go through
  3. Briefly go through
  4. great potential to benefit oneself and the community at large ( think business marketing and championing social/national cause, improving on your understanding of concepts by reading online textbooks, websites, asking questions online, learning new skills online etc.)
  5. Briefly go through
  6. Briefly go through
  7. Present this to the students: (Main thing is to quickly touch on how social networking has changed the way we communicate and share information. When used properly, the Internet has great potential to benefit oneself and the community at large Social networks have totally changed the way in which men and women communicate and share information ( think business marketing and championing social/national cause, improving on your understanding of concepts by reading online textbooks, websites, asking questions online, learning new skills online etc.) There is so much potential for using social networking but with these affordances also bring with it the negative aspects: Social Networking Addiction and other issues that result from it. With so much information on the web that people can access, there is really a need for people to be discerning about what they see online and also what they post online. Video on social media revolution (ask the students to access in their own free time) https://www.youtube.com/watch?feature=player_embedded&v=dA5Fn_Q10Tk
  8. Go through briefly. Main aim of the slide is just to show that many teens acknowledge that they are addicted to social media, and they are seeking help about it. Hence, it is very important to know more about social networking addiction through this lesson.
  9. Briefly go through points in the slides, don’t need to elaborate
  10. Briefly go through: Internet addiction is really addictive causes changes to the brain similar in the way drugs do. And these changes can affect one’s decision-making skills, self-control and emtions.
  11. Briefly go through Easy to access via internet-enabled devices (e.g. mobile, ipad) Offer all sorts of information and comments from other internet users (curiosity, human nature) Easier to befriend other users, false sense of belonging to a social circle Provide an outlet for emotions, forget hurdles of everyday life
  12. DISCUSSION QUESTION Start by asking the class the question “What are the dangers of social networking sites” Guiding questions to start the ball rolling: Has anyone of you come across any news articles / heard any news about what happened to friends/themselves due to activity on social networking sites? Who among you here share a lot of information about yourself on your FB /Twitter account? Did it cause you any problems? Have you ever thought about how the information you share on the social networking sites will be detrimental to you? Then show the points on the slide as a form of consolidation of all the comments. (http://www.razor.tv/site/servlet/segment/main/currentaffairs/59880.html
  13. DISCUSSION QUESTION Start by asking the class the question “What are considered irresponsible behaviours on the Internet?” Guiding questions to start the ball rolling: Has anyone of you come across any comments posted by your friends or other people that are negative? What is the content of the remarks posted by them? How do you feel about the comments? Have you heard of anyone who was being arrested due to irresponsible behaviour on the Internet? What did they post online? Then show the points on the slide as a form of consolidation of all the comments.
  14. Briefly go through case study then show video After the video, SUMMARISE the learning points from the video 1) This video shows the profile of people who could be potential bullies, how the bullies work, as well as the various tips to stop cyberbullying. 2) So now you know who are the people vulnerable to be a bully! 3) Other point is that the cyberbully, by posting the negative remarks on the Internet, can influence other people to add on to the negative comments. So we should always be mindful. Do not add on to the remarks just for the fun of it. You may be hurting someone unknowingly and cause psychological and emotional hurt . 4) Everyone plays a part in preventing cyberbullies from hurting others , by speaking up against them and refrain from joining them in adding on to the negative posts. https://www.youtube.com/watch?feature=player_embedded&v=-5PZ_Bh-M6o
  15. Briefly go through case study. Highlight the fact that if the couple breaks up, and the boyfriend propagates the images online (there are cases of this!) - Imagine the emotional and psychological hurt on the girl. Girls, think before you act! Show only half of the video (starting from the middle portion) if time is running out. The main objective of the video is to show that the initial good feelings that you have for your online friend may just be a façade, and that the criminal or “friend” may just be buying time and trying to gain your trust first before striking. https://www.youtube.com/watch?v=lHmp4TB7hfg&feature=player_embedded
  16. Briefly go through case study Tell the class that this is one of the many case studies on insensitive comments. They are all liable to be charged under Sedition Act. Highlight this fact
  17. Briefly go through: Ask for response from the floor to fill in the blanks.
  18. Ask the audience if they can recognise Xiaxue’s face and if know what this case is about. Let the audience read about the case Reinforce the message that BOTH parties ARE victims. Xiaxue was the victim first. But the way she got back at her critics got her into trouble instead .
  19. DISCUSSION QUESTION Before starting discussion. Have a quick poll. Ask the class to raise their hands if they agree with the statement “ It is my account. I post anything I want. I am entitled to it.” If there is time, invite one person who raise their hand to share why he/she thinks he can post anything online. Possible answers may include: It is my account. I do not need to accommodate other people who don’t like to read what I post ( Counter this by saying that, even if it is a personal account, and that everyone should have free speech, it does not mean you can say anything you want. We still need to be mindful of how they can affect other people negatively. I have set the privacy settings so that anything I post is only limited to certain people ( Counter this by saying that other friends in the private group may re-post what they see on your post to other platforms – cannot undo the action) Then, ask another person who did not raise hand (disagree with the statement) to share why he/she disagrees. Possible answers may include: Ultimately, the right to free speech should not extend to posting comments that can hurt others (cyberbullying), or incite racial or religious conflict. We should also refrain from adding on to friends’ comments that are hurtful or offensive. We should always respect others’ on the online community, just like how we do, in real life. Writing negative things behind an annonymous veil is a shameful and unethical thing to do. It shows that you do not dare to be accountable for what you say or do on the Internet. If the above question is well done, can skip question 1 and move on to question 2. Question 1: Invite students to tell the rest what they post online. Ask the audience guiding questions like Ask someone to share about what they post online (on status updates). Do you criticise your classmates/ laugh at them online for certain things like weird behaviour/appearance? Do you comment negatively on people or events? Do you name a specific target in your negative comments? Do you add on to your friends’ negative comments or like their comments? Conclusion: Ultimately, the right to free speech should not extend to posting comments that can hurt others (cyberbullying), or incite racial or religious conflict. We should also refrain from adding on to friends’ comments that are hurtful or offensive. We should always respect others’ on the online community, just like how we do, in real life. Writing negative things behind an annonymous veil is a shameful and unethical thing to do. It shows that you do not dare to be accountable for what you say or do on the Internet. Question 2: For consolidation of points for this question, go on to the next 2 slides . Employers can look at your photos, status updates, and conversations with friends (public information) judge you on your degree of emotionally stability, conscientiousness, extroversion, intellectual curiosity and agreeableness.
  20. Briefly go through. Main thing to highlight is that Facebook (or other networking sites) is so public. Anyone who wants to find out more about you can very easily get info about you. Conclusion  Be mindful of what you post online! They will shape other people’s first impression of you!
  21. Go through using the points in the slides.
  22. Don’t forget you have a REAL LIFE! Track your time online! Be discerning about what you see or read online Not everyone share factual and accurate information online Keep personal profile private Limit sharing of personal information, photographs and videos to only close friends, family and etc (e.g. restrict access to your account or activate privacy settings) Respect the privacy of other users Practice netiquette Be responsible in sharing information online
  23. If there is no time for gaming addiction, Show the video on Gaming addiction, then the slides on 29, 30, 32 (Video on gaming addiction already comprises of negative impacts)
  24. neglecting personal health and hygiene – skipping meals or losing sleep in order to spend more time on game playing neglecting school work, result in declining school performance or grade prefer games over social activities such as going out with friends
  25. Briefly go through. BUT Highlight 2 points: - Good rewarding system in most game, giving the players the feeling of achievement. - Social platform – games can be played with friends and these game friends become a natural support network ‘ Live’ virtual world – some games have endless world or no-end to the game playing
  26. Briefly go through: Can ask audience whether they know which are the popular MMORPGs in Singapore: MapleStory, Audition, World of Warcraft, Blackshot, GunZ, Minecraft Especially addictive if you are a strong player Ask students whether they know which genres of games are the most addictive online? Sometimes, games such as Maple Story, which requires long time commitment to have a “strong” character cause such addiction. In-game rewards are based on a leveling system. When starting a MMORPG a player's character begins with very basic attributes with regard to experience, strength, intelligence, courage, powers, etc. Initially, it takes very little play (perhaps minutes) to reach the next level and gain new skills - this is immediately rewarding and reinforces continued play. However, each successive level begins to take more play time to reach - eventually taking weeks or months to level-up. By this time however, the gamer has gradually adapted and accepted the greater effort required to reach the next level. Some gamers who entered the competition at a later time catch up by using real money to get better items that cannot be bought with game money. Online games are addictive if you are a strong player in the game. People respects you, treats you nicely, some even "worships" you! But to be a strong character in any kind of games requires not just skill but also time, a lot of time. In real life, a person can be looked down on, get bullied often, etc. but in online games? Having a stronger character compared to others, people will look up to you because of your "strength" in the game. In more ways than one, this causes the player to become more immersed into the game and gradually losing regard for the real world, having an idea like:" In this game, I am King/Queen!! Nothing can possibly be better than this!!" This thus results in addiction.
  27. Briefly go through
  28. Briefly go through but highlight the impact games can have on your decision making and self-management. Can you imagine this teenager who looks so gentlemanly and obliging , actually punched his father when he told him to stop playing games?
  29. Briefly go through the serious effects online gaming can have on people. To the extent of killing other people. Can you imagine how negatively it affects your decision-making and self-management skills? Online gaming addiction, and the accompanying societal woes, have gotten so bad that Korea has considered several laws to help address the problem. Most of these proposed laws are directed at teenagers.
  30. Online gaming addiction, and the accompanying societal woes, have gotten so bad that Korea has considered several laws to help address the problem. Most of these proposed laws are directed at teenagers.
  31. Balance lifestyle - have regular breaks from game playing Pick up a new hobby (e.g. non online activity, painting, learning a new instrument, sports etc) Engage in other activities e.g. movie with friends, dinner with your family etc Learn time-management skills such as setting reasonable time limits on how much time to spend on game playing
  32. This activity should take about 10 min. Tell the audience that the main aim of this is for them to pledge their commitment towards a better online culture. They can choose either question to respond to and you will type out their responses as they say it out in class, under youthchaNgE Buzz. One way to facilitate this session Invite the class to choose either one question. Class to discuss what collective comments they want to put on youthchange buzz.
  33. Briefly go through
  34. Briefly go through
  35. Respect for Privacy Keep personal information of onself and others private Respect people’s privacy and remove content if you receive complaint about it Be civil and avoid flaming, trolling and other negative behaviors  
  36. Briefly go through
  37. Briefly go through