Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

Cyberwellness (QED527 TG35) by Mind Map: Cyberwellness
(QED527 TG35)
0.0 stars - 0 reviews range from 0 to 5

Cyberwellness (QED527 TG35)

School - teachers

When students are using computers in the class/labs, it is essential for teachers to walk around to observe that students are on the right track and are focused on task and not viewing prohibited websites. If a student is caught, it's important to counsel the student about using cyberspace in an appropriate and responsible manner.

Filtering system for parental control

But, can't some filtering systems be turned off easily by others? How do we go about the problem then? There is a passwork locking system available?



Making derogatory remarks about the child online on blogs or forums

Constantly killing the child's character in the game by a bully causing frustration and anxiety to the child

What is cyberbullying?

Privacy and human rights

Privacy? What really is privacy? Please see the link:

Cyber gaming

Online gambling

Educational games

Cyber stalking


constant need to check emails

Online gaming for long hours

constant need to chat

Online child pornography

What is it?, "Defined as any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct."

Effects, On the child, "It is important to realize that these images are crime scene photos – they are a permanent record of the abuse of a child. The lives of the children featured in these illegal images and videos are forever altered. Once these images are on the Internet, they are irretrievable and can continue to circulate forever. The child is revictimized as the images are viewed again and again. ", On society

What is being done?, State level, Laws against the propagation of child pornography, Online, Websites created to increase awareness on the horrors of child pornography and to protect children online, NGOs, UNICEF, How about the role of family?, Parents to play an active role in protecting their children's identities online. Parents should also ensure that their children are not communicating with dubious people online through restricting the kinds of webpages their children are allowed to visit, limiting the amount of time their children spend on the internet etc., Parents should try to get involved with their child's internet usage. Surf the internet with the child so as to simultaneously educate the child on usage., E.g. Parents can set up a blog site with young children and blog together on the highlights of their days, post pictures together.


Disclosing personal information online

gmail / twitter hack

Phishing, Recognizing Phishing

using social networking widgets for hacking and criminal activities, difficulty in tracking user movement online, Hackers targeting social networks due to its extensive amount of personal information / Hacking as a lucrative income / cyber crime mafias, Technology

Online Slandering through blogs


property and ownership issues

Internet integrity (information)

Racism on the internet



Online dating

Dating system which allows individuals, couples, groups to make contact and communicate with each other over the internet., Objective: developing a personal, romantic or sexual relationship, Problem: Members profiles may not be real and there is great distrust, of age, gender, marital status, photographs. It can lead to stalking, fraud, sexual violence as young teens can easily be taken advantage of by online predators.

Why we need it

To educate the students the proper etiquette of using the internet

Social responsibility

Protect individuals from harm

financial harm (e.g. scamming/phishing)

emotional harm (e.g. cyberbullying)

physical harm (e.g. unsuspecting youths preyed upon by older adults)

To maximize the potential of cyberspace

The progress to a technology enhanced lifestyle makes it inevitable for us to ignore this area of potential threat.


target group

Secondary students from 13yrs old to 17 yrs old

YouTube as an educational tool as well as entertainment


refers to the positive well-being of Internet users

Safe and responsible use

involves an understanding of risks of harmful online behaviours

involves an awareness of how to protect oneself and other Internet users

Showing respect for self and other users.

Online security

General Statistics

Statistic on Pornography

Statistic on Addiction

Statistics on Singaporeans' aware of cyberwellness