80% found this document useful (10 votes)
5K views47 pages

The Digital Self

Adolescents today are heavily exposed to technology through widespread computer and internet use and sophisticated mobile phones. The Philippines has one of the fastest growing smartphone markets in Southeast Asia. Statistics show high rates of technology use among teens in Western countries, with most owning phones, some owning laptops/tablets, and many sending 50+ texts per day. While technology provides opportunities, it can also enable benign or toxic disinhibition and cyberbullying if not used carefully. It is important for adolescents to manage their digital identities and online behavior safely and responsibly.

Uploaded by

Jeffreym Arcenam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
80% found this document useful (10 votes)
5K views47 pages

The Digital Self

Adolescents today are heavily exposed to technology through widespread computer and internet use and sophisticated mobile phones. The Philippines has one of the fastest growing smartphone markets in Southeast Asia. Statistics show high rates of technology use among teens in Western countries, with most owning phones, some owning laptops/tablets, and many sending 50+ texts per day. While technology provides opportunities, it can also enable benign or toxic disinhibition and cyberbullying if not used carefully. It is important for adolescents to manage their digital identities and online behavior safely and responsibly.

Uploaded by

Jeffreym Arcenam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

Todays adolescent are exposed a

technology revolution with the prevalence


of computer use and accessibility, the
internet and sophisticated mobile phones.
The social environment of present day
adolescents has increasingly become
digitally mediated.
According to the Medinilla (2016) , the
Philippine is the fastest growing market
smart phones in the ASSOCIATION OF
SOUTHEAST ASIAN NATIONS (ASEAN)
based the report or the market research
company, International Data
Corporation(IDC).
 Another report indicated about 3.5 million
smartphones were shipped to the country during the
first quarter 2016.
 Statistics from Western countries showed that in 2012,
78% of online teens own a cell phone , 8 out of teens
own a desktop or laptop, 23% teens have a tablet
computer , and 50% send 50 or more text messages a
day.
Americans between the Ages of 8
and 18 years spend on average 7.5
hours per day using some sort of
electronic devices , and 95% of them
have access to the internet as
reported.
Defined as those
capabilities possessed by
individuals who are living,
learning, working in a
digital society
In the real world , authority and status may be
expressed by clothing and body language
In virtual interactions this marker are
stripped.
In cyberspace, people are more willing to
speak out and misbehave without fear of
disapproval and punishment from authority
figures.
Adolescents who speak out may believe
that they come from a position of
authority just like others due to the
linkages and easy access of
communication . In cyberspace, authority
is minimized.
The lack of restraint one feels
when communicating online in
comparison to communicating
in person.
It can enhance self-esteem and self-
confidence . Using the internet could be
the satisfying relationship to provide
emotional support. Individuals with low
self-esteem are more comfortable with
online interactions.
Benign Disinhibition
Toxic Disinhibition
It indicates an attempt to understand and
explore oneself, to work through problems and
find new ways of being.
It is to combat loneliness and depression
through online interaction.
Social interaction may moderate negative
moods.
Includes the rude language , harsh
criticism , anger , hatred and even threats
online.
Others may even go to the dark side of the
internet where they can access
pornography crimes and other forms f
violence.
 It is the bullying that takes place using electronic
technology.
 Electronic Technology includes the devices and
equipment , such as cellphones, computer, and
tablets as well as communication tools such as
social media sites, text messages, chat, and
websites.
 Can be form by harassing, threatening,
humiliating, hassling of peers, spreading humors,
creating web pages, videos and fake social profile
to make fun with others.
 It can also be through taking photos and videos of
others without their knowledge and distributing
them online.
It is the use of Information
Communication and Technology to
harass, control, manipulate, or habitually
disparage a child , adult, business or
group, without a direct or implied threat
of physical harm.
 Don’t post or send anything you would be
embarrassed for certain others to see.
 Do be careful about over sharing.
 Don’t hang out with “wrong crowd” online.
 Don’t hang out with the “wrong crowd” offline.
 Do consider your emotional state before virtually
posting or responding to anything.
 Do consider the reaction individuals are expecting
from toxic disinhibition
 Do search for yourself online.
Refers to anything that describes a persona
an individual presents across all the digital
spaces that he/she represented in.
Symbolic markers express one’s identity to
others and helps them make sense of it
themselves .
In relationship to identity,
internet disembodiment
refers to the identity, soul, or
spirit separate from physical
body.
USER ID- lets person associate a persistent ID
for a single user with that user’s engagement
data from one or more sessions initiated from
one or more devices.
Username- is also called log in name , sign in
name, sign on name which is unique
sequence of characters used to identify a user
and allow access to computer system ,
computer network , or online account.
Reading another person’s message
might be experience as voice within
one’s heads as if that person’s
psychological presence and influence
have been assimilated or introjected
into one’s psyche.
As the word
“anonymous” indicates a
person can have no
name or atleast not the
real name.
It is a range of strategies that
people adopt to shape what others
think of them.
The person who is using self-promotion is
trying to show that he/she is competent ,
effective or a winner. This person expects
respect. He/she speaks loudly about their
experience, education or achievement.
He/she makes people aware of their
accoplisments.
The person using ingratiation is presenting
oneself to others has a desire to be
likeable. They expect affection. This person
takes an interest in one’s personal lives to
show them that they are friendly he/she
often uses flattery and favours to make
others like them.
 The person who is using exemplification has an
intention to achieve worth from others. He/she
expects others to feel guilty by their actions. This
person tries to appear like a hard-working
dedicated employee to make other feel less
worthy than they are. He/she stays at work late
so that people will know that they are hard-
working.
 The person who is using intimidation tries to
appear dangerous or ruthless. He/she expects
others to be afraid of them. People do this when
they are expecting others finish a task. For
instance, the boss intimidates subordinates to get
job done. He/she shows others that they can make
life difficult form them if they are pushed too far.
The person using supplication, would like to
appear helpless (handicapped or unfortunate).
He/she aims to achieve nurturance from others.
This person would act as if they know less than
others so people will help them out. He/she
pretends not to understand something to gain
someone’s help.
Refers to the tendency to think oneself in
a favourable light, whereas impression
management refers to a deliberate
attempt to distort one’s responses in
order to create a favourable impression
with others.
The development of the person’s social
aspects can be greatly influenced by
technology due to an insufficient amount
of real life social encounters. Although
online encounters are easy and more
convenient than real life encounters,
facial expression, body language, eye
contact and conversation skills suffer.
 Abused of technology always lead to negative
consequences. Even if there are cases when social
media negatively impacts users, it would be unfair
if only technology would be blamed.
 It is the responsibility of the users to be cautious
on what they post on social media.
 Although posting has its advantages, the users
should be extra careful of the text messages and
images they post especially those that might
cause harm to others and to themselves as well.
Are the set of guidelines , rules or limits
that a person creates to identity
reasonable, safe and permission ways for
people to behave towards them and how
they respond in case someone breaks
these rules or oversteps the limits.
 Made up of both personal identity and social
identity.
 Social Identity- it is usually base on group
affiliation. Like social media many people identify
themselves as member of a certain group so that it
will be easy for them to communicate their
concern issues.
In modern era identity is described
as fixed, stable and unitary.
In post modern period identity is
considered as fluid , multiple and
socially constructed.
States that psychological and
behavioural differences between boys
and girls become greater during early
adolescence because of increase
socialization pressure to conform to
masculine and feminine gender roles.
• 1. Keep your software/apps updated and delete the ones
you don’t use.
• 2. Be careful when dealing with emails from unknown
sources
• 3. Don’t click that link or online ad
• 4. Just because it’s free, it doesn’t mean it’s safe
• 5. Do not reveal sensitive information online
• 6. Keep your account information for yourself
 7. Report illegal activities or offending content
 8. What you post online stays online forever.
 9. Use antivirus protection before you go online
 10. Create back-up copies for your important stuff
THANKYOU FOR LISTENING
TO GOD BE THE HIGHEST
GLORY !

You might also like