Wednesday, August 12, 2015

SPOT IT

Hello peeps!

If you could remember that Invisible Trace campaign have various kinds of exciting activities. One of them was SPOT IT and I feel it’s the most awesome activities prepared for people to participate!
Now, let me explain how this activity called SPOT IT actually works. First of all, we set up a table and on the table itself; we set a partition to make it looks like a mirror kind of image. The scenario is set up in an office table setting. Basically SPOT IT is the concept of “Spot the difference” but this time, we make it into a reality so called spot the difference. Sounds quite easy right??

Here’s where we make it more challenging.

There will be a significantly 10 differences between both sides of the mirror. The overall time limit set on this activity is only 1 minute and 60 seconds. Participants are given 30 seconds to look at the scene of only the left side of the partition. After 30 seconds has passed, they will come to the other side and will be given 30 seconds to find the answer. Another 30 seconds will be given for them to tell the committee what’s the answer.

They can only see but not allowed to touch those display items on the table. Participants are not allowed to refer to the other side of the partition for answers. In short, participants have to actually memories what they see.




Participants are memorizing in details of everything they can see in 30 seconds.




This group managed to find all 10 significant differences after numeral number of trials =D


The message behind this activity is to tell people to be aware when they are using the internet. An example is Wi-Fi. People will think Wi-Fi is a Wi-Fi, as long can connect than its okay but they did not know that there are two types of Wi-Fi. One is private Wi-Fi and the other is public Wi-Fi. There are differences in these two types. Private Wi-Fi is secured with security password which is save to use but private Wi-Fi is free for all users which is can be very dangerous for hackers to retrieve a person’s privacy data.



Written By: 
Foong Kee Wah
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

No comments:

Post a Comment