• Skip to main content
  • Skip to footer

Peerbox.at | Make IT safe 2.0

  • Deutsch
You are here: Home / A – The web and me / Terms pyramid

Terms pyramid№ 58

Aim To understand and explain terms
Duration 10-20 min
Number of participants At least two groups of 2 and one moderator
Age -
Difficulty advanced
Conditions -
Material Flipchart paper or cards that can be attached to a pin board or a normal wall, pens, timer
Preparation
Preparing playing surface
Description

A triangle is drawn on an area (e.g. flipchart, blackboard…). This will include terms on various topics relating to the safe use of the Internet and smartphones. There should be 6 terms in the pyramid (one at the top, two in the middle and three at the bottom).

A group thinks up terms for a given topic. Meanwhile, the other group leaves the room. The moderator specifies the topics and, if necessary, helps the young people to think about them. The group should insert 6 matching terms into the pyramid.

Now the group that was outside comes back in. A group member may not see what is written on the pyramid.

The other group names the topic and the group member who is not allowed to see the pyramid should guess the terms. The other group member who is allowed to see the pyramid may explain the terms to the team member. Each group has 3 minutes to guess the terms.

For each guessed term the group gets one point. Afterwards, the next group has a different topic.

The group with the most points wins the game.

Possible stumbling block:

There may be no terms at all for a topic. Here the moderator should help (e.g. in the form of transcriptions, ideas).

Examples:

Which accesses can apps have?

Examples: Camera, contact list, location, album, microphone, mobile data

How does cyberbullying manifest itself?

Examples: Insult, identity theft, blackmail, slander, embarrassing photos, exclusion, harassment (telephone terror, spam)

What are the possible reasons for cyberbullying?

Examples: Discrimination, boredom, envy, quarrel, fun, search for attention

Functions of the Smartphone?

Examples: Telephoning, writing e-mails, using the Internet, listening to music, alarm clock, clock, downloading apps, video telephony, taking pictures

What information should I not publish on the Internet?

Examples: Full name, date of birth, phone number, home address, password, embarrassing pictures

How do you recognize hate postings?

Examples: Generalisations, discrimination and insults, rumours, juxtapositions (“we” and “the”), conspiracy theories (e.g. in chain letters), false knowledge that is adopted by others, for example

Source Sabrina Widmoser
Tags media education, reflection

Download PDFAdd to bookmarksWe used that

Footer

Pages

  • Cookie Policy
  • Digitale Medien in der Jugendarbeit
  • My Bookmarks
  • Partner

Ein Peer2Peer Projekt von ECPAT Österreich, ÖIAT, BJV, bOJA und BÖJI
Englische Version mit freundlicher Unterstützung des Interkulturellen Zentrum und gefördert durch Erasmus+
Impressum