Adolescents today are heavily exposed to technology through widespread computer and internet use and sophisticated mobile phones. The Philippines has one of the fastest growing smartphone markets in Southeast Asia. Statistics show high rates of technology use among teens in Western countries, with most owning phones, some owning laptops/tablets, and many sending 50+ texts per day. While technology provides opportunities, it can also enable benign or toxic disinhibition and cyberbullying if not used carefully. It is important for adolescents to manage their digital identities and online behavior safely and responsibly.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
80%(10)80% found this document useful (10 votes)
5K views47 pages
The Digital Self
Adolescents today are heavily exposed to technology through widespread computer and internet use and sophisticated mobile phones. The Philippines has one of the fastest growing smartphone markets in Southeast Asia. Statistics show high rates of technology use among teens in Western countries, with most owning phones, some owning laptops/tablets, and many sending 50+ texts per day. While technology provides opportunities, it can also enable benign or toxic disinhibition and cyberbullying if not used carefully. It is important for adolescents to manage their digital identities and online behavior safely and responsibly.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47
Todays adolescent are exposed a
technology revolution with the prevalence
of computer use and accessibility, the internet and sophisticated mobile phones. The social environment of present day adolescents has increasingly become digitally mediated. According to the Medinilla (2016) , the Philippine is the fastest growing market smart phones in the ASSOCIATION OF SOUTHEAST ASIAN NATIONS (ASEAN) based the report or the market research company, International Data Corporation(IDC). Another report indicated about 3.5 million smartphones were shipped to the country during the first quarter 2016. Statistics from Western countries showed that in 2012, 78% of online teens own a cell phone , 8 out of teens own a desktop or laptop, 23% teens have a tablet computer , and 50% send 50 or more text messages a day. Americans between the Ages of 8 and 18 years spend on average 7.5 hours per day using some sort of electronic devices , and 95% of them have access to the internet as reported. Defined as those capabilities possessed by individuals who are living, learning, working in a digital society In the real world , authority and status may be expressed by clothing and body language In virtual interactions this marker are stripped. In cyberspace, people are more willing to speak out and misbehave without fear of disapproval and punishment from authority figures. Adolescents who speak out may believe that they come from a position of authority just like others due to the linkages and easy access of communication . In cyberspace, authority is minimized. The lack of restraint one feels when communicating online in comparison to communicating in person. It can enhance self-esteem and self- confidence . Using the internet could be the satisfying relationship to provide emotional support. Individuals with low self-esteem are more comfortable with online interactions. Benign Disinhibition Toxic Disinhibition It indicates an attempt to understand and explore oneself, to work through problems and find new ways of being. It is to combat loneliness and depression through online interaction. Social interaction may moderate negative moods. Includes the rude language , harsh criticism , anger , hatred and even threats online. Others may even go to the dark side of the internet where they can access pornography crimes and other forms f violence. It is the bullying that takes place using electronic technology. Electronic Technology includes the devices and equipment , such as cellphones, computer, and tablets as well as communication tools such as social media sites, text messages, chat, and websites. Can be form by harassing, threatening, humiliating, hassling of peers, spreading humors, creating web pages, videos and fake social profile to make fun with others. It can also be through taking photos and videos of others without their knowledge and distributing them online. It is the use of Information Communication and Technology to harass, control, manipulate, or habitually disparage a child , adult, business or group, without a direct or implied threat of physical harm. Don’t post or send anything you would be embarrassed for certain others to see. Do be careful about over sharing. Don’t hang out with “wrong crowd” online. Don’t hang out with the “wrong crowd” offline. Do consider your emotional state before virtually posting or responding to anything. Do consider the reaction individuals are expecting from toxic disinhibition Do search for yourself online. Refers to anything that describes a persona an individual presents across all the digital spaces that he/she represented in. Symbolic markers express one’s identity to others and helps them make sense of it themselves . In relationship to identity, internet disembodiment refers to the identity, soul, or spirit separate from physical body. USER ID- lets person associate a persistent ID for a single user with that user’s engagement data from one or more sessions initiated from one or more devices. Username- is also called log in name , sign in name, sign on name which is unique sequence of characters used to identify a user and allow access to computer system , computer network , or online account. Reading another person’s message might be experience as voice within one’s heads as if that person’s psychological presence and influence have been assimilated or introjected into one’s psyche. As the word “anonymous” indicates a person can have no name or atleast not the real name. It is a range of strategies that people adopt to shape what others think of them. The person who is using self-promotion is trying to show that he/she is competent , effective or a winner. This person expects respect. He/she speaks loudly about their experience, education or achievement. He/she makes people aware of their accoplisments. The person using ingratiation is presenting oneself to others has a desire to be likeable. They expect affection. This person takes an interest in one’s personal lives to show them that they are friendly he/she often uses flattery and favours to make others like them. The person who is using exemplification has an intention to achieve worth from others. He/she expects others to feel guilty by their actions. This person tries to appear like a hard-working dedicated employee to make other feel less worthy than they are. He/she stays at work late so that people will know that they are hard- working. The person who is using intimidation tries to appear dangerous or ruthless. He/she expects others to be afraid of them. People do this when they are expecting others finish a task. For instance, the boss intimidates subordinates to get job done. He/she shows others that they can make life difficult form them if they are pushed too far. The person using supplication, would like to appear helpless (handicapped or unfortunate). He/she aims to achieve nurturance from others. This person would act as if they know less than others so people will help them out. He/she pretends not to understand something to gain someone’s help. Refers to the tendency to think oneself in a favourable light, whereas impression management refers to a deliberate attempt to distort one’s responses in order to create a favourable impression with others. The development of the person’s social aspects can be greatly influenced by technology due to an insufficient amount of real life social encounters. Although online encounters are easy and more convenient than real life encounters, facial expression, body language, eye contact and conversation skills suffer. Abused of technology always lead to negative consequences. Even if there are cases when social media negatively impacts users, it would be unfair if only technology would be blamed. It is the responsibility of the users to be cautious on what they post on social media. Although posting has its advantages, the users should be extra careful of the text messages and images they post especially those that might cause harm to others and to themselves as well. Are the set of guidelines , rules or limits that a person creates to identity reasonable, safe and permission ways for people to behave towards them and how they respond in case someone breaks these rules or oversteps the limits. Made up of both personal identity and social identity. Social Identity- it is usually base on group affiliation. Like social media many people identify themselves as member of a certain group so that it will be easy for them to communicate their concern issues. In modern era identity is described as fixed, stable and unitary. In post modern period identity is considered as fluid , multiple and socially constructed. States that psychological and behavioural differences between boys and girls become greater during early adolescence because of increase socialization pressure to conform to masculine and feminine gender roles. • 1. Keep your software/apps updated and delete the ones you don’t use. • 2. Be careful when dealing with emails from unknown sources • 3. Don’t click that link or online ad • 4. Just because it’s free, it doesn’t mean it’s safe • 5. Do not reveal sensitive information online • 6. Keep your account information for yourself 7. Report illegal activities or offending content 8. What you post online stays online forever. 9. Use antivirus protection before you go online 10. Create back-up copies for your important stuff THANKYOU FOR LISTENING TO GOD BE THE HIGHEST GLORY !
Dokumen - Pub Quick Start Guide To Large Language Models Strategies and Best Practices For Using Chatgpt and Other Llms Addison Wesley Data Amp Analytics Series 1nbsped 0138199191 9780138199197