Aim | To understand and explain terms |
---|---|
Duration | 10-20 min |
Number of participants | At least two groups of 2 and one moderator |
Age | - |
Difficulty | advanced |
Conditions | - |
Material | Flipchart paper or cards that can be attached to a pin board or a normal wall, pens, timer |
Preparation Preparing playing surface |
|
Description A triangle is drawn on an area (e.g. flipchart, blackboard…). This will include terms on various topics relating to the safe use of the Internet and smartphones. There should be 6 terms in the pyramid (one at the top, two in the middle and three at the bottom). A group thinks up terms for a given topic. Meanwhile, the other group leaves the room. The moderator specifies the topics and, if necessary, helps the young people to think about them. The group should insert 6 matching terms into the pyramid. Now the group that was outside comes back in. A group member may not see what is written on the pyramid. The other group names the topic and the group member who is not allowed to see the pyramid should guess the terms. The other group member who is allowed to see the pyramid may explain the terms to the team member. Each group has 3 minutes to guess the terms. For each guessed term the group gets one point. Afterwards, the next group has a different topic. The group with the most points wins the game. Possible stumbling block: There may be no terms at all for a topic. Here the moderator should help (e.g. in the form of transcriptions, ideas). Examples: Which accesses can apps have? Examples: Camera, contact list, location, album, microphone, mobile data How does cyberbullying manifest itself? Examples: Insult, identity theft, blackmail, slander, embarrassing photos, exclusion, harassment (telephone terror, spam) What are the possible reasons for cyberbullying? Examples: Discrimination, boredom, envy, quarrel, fun, search for attention Functions of the Smartphone? Examples: Telephoning, writing e-mails, using the Internet, listening to music, alarm clock, clock, downloading apps, video telephony, taking pictures What information should I not publish on the Internet? Examples: Full name, date of birth, phone number, home address, password, embarrassing pictures How do you recognize hate postings? Examples: Generalisations, discrimination and insults, rumours, juxtapositions (“we” and “the”), conspiracy theories (e.g. in chain letters), false knowledge that is adopted by others, for example |
|
Source | Sabrina Widmoser |
Tags | media education, reflection |