Gaming Controller for disabled people

The Proteus Controller All-in-One Kit allows gamers to build their own way to play. The unique modular video game controller kit features innovative ‘snap and play’ parts that easily connect together and comes with everything that gamers need to play their favorite Xbox and PC games right out of the box. With this one kit, players can build over 100 million traditional and custom configuration and LED lighting variations. Here is the link: https://www.byowave.com/

Doing Digital Inclusion: Disability handbook

The Social Model of Disability is the framework from which we look at the issues about accessing digital support. The model sates: “The social model of disability says that disability is caused by how society is organised, rather than by a person’s impairment or difference. It looks at ways of removing barriers that restrict life choices for disabled people”.

Breaking Down Barriers: How Compounding Inequalities Impact Access to Digital Health Services

A third of people who are offline find that the NHS is one of the most difficult organisations to interact with (Lloyds, 2022). In addition, those who are offline are twice as likely to indicate a health condition compared to those who are online (Lloyds, 2023).

These statistics tell us that not only do those who are digitally excluded struggle to interact with health services, they are also more likely to need to.

This overlap between digital exclusion and access to health-care has been well researched by member organisations within the VCSE (Voluntary, Community and Social Enterprise) Health and Wellbeing Alliance, a partnership between voluntary sector representatives and the health and care system focused on improving services for communities. Our recent ‘Designing For Digital Inclusion in Healthcare’ seminar series was a project supported by the alliance, with the aim of drawing together this research and learning, to help reduce barriers to accessing health care.https://www.goodthingsfoundation.org/what-we-do/news/compounding-inequalities-in-accessing-digital-health-services/?fbclid=IwAR1jF9yfb9ziCsQ4XTuv0s8C43TVfMm8mBcFu-kc5zcnFw5804XrUbrKwr8

Mastodon Social Media – A Challenge to X (Formerly Twitter

Mastodon is free and open-source software for running self-hosted social networking

services. It has microblogging features similar to Twitter, which are offered by a large

number of independently run nodes, known as instances or servers, each with its

own code of conduct, terms of service, privacy policy, privacy options, and content

moderation policies.

Each user is a member of a specific Mastodon server that can interact seamlessly

with users in any other server. This is intended to give users the flexibility to select a

server whose policies they prefer but keep access to a larger federated social

network. Mastodon is powered by the ActivityPub protocol, making it part of the

Fediverse ensemble of services such as Lemmy, Pixelfed, Friendica, PeerTube, and

Threads.

Mastodon was created by Eugen Rochko and announced on Hacker News in

October 2016.[9] It gained significant adoption in 2022 in the wake of Twitter’s

acquisition by Elon Musk. The project is maintained by the German non-profit Mastodon gGmbH. Mastodon

development is crowdfunded, and the code does not support advertisements.

Functionality and features

Mastodon servers run social networking software that is capable of communicating

using W3C’s ActivityPub standard, which has been implemented since version

1.6.[14] A Mastodon user can therefore interact with users on any other server in the

Fediverse that supports ActivityPub.

Since version 2.9.0, Mastodon has offered a single-column mode for new users by

default.[15] In advanced mode, Mastodon approximates the microblogging user

experience of TweetDeck. Users post short-form status messages, historically known

as “toots”,[16] for others to see. On a standard Mastodon instance, these messages

can include up to 500 text-based characters, greater than Twitter’s 280-character

limit. Some instances support even longer messages.

Users join a specific Mastodon server, rather than a single centralized website or

application. The servers are connected as nodes in a network, and each server can

administer its own rules, account privileges, and whether to share messages to and

from other servers. Many servers have a theme based on a specific interest. It is

also common for servers to be based around a particular locality, region, ethnicity, or

country.

Mastodon includes several specific privacy features. Each message has a variety of

privacy options available, and users can choose whether the message is public or

private. Public messages display on a global feed, known as a timeline, and private

messages are only shared on the timelines of the user’s followers. Messages can

also be marked as unlisted from timelines or direct between users. Users can also

mark their accounts as completely private. In the timeline, messages can display

with an optional content warning feature, which requires readers to click on the

hidden main body of the message to reveal it. Mastodon servers have used this

feature to hide spoilers, trigger warnings, and not safe for work (NSFW) content,

though some accounts use the feature to hide links and thoughts others might not

want to read.

Mastodon aggregates messages in local and federated timelines in real time. The

local timeline shows messages from users on a singular server, while the federated

timeline shows messages across all participating Mastodon servers. Users can

communicate across connected Mastodon servers with usernames similar in format

to full email addresses.

Here is a link for update: https://joinmastodon.org/

Autism and the internet: risks and benefits

Patrick Sims, a freelance autism writer examines the risks and benefits of the
internet for autistic people and their families. Patrick discusses issues such as
cyberbullying and hacking, before exploring the value of the internet in
developing friendships and support networks.
It is difficult to know where to start with this article. The majority of people
reading it will already have strong views regarding autism and the internet,
social media and online gaming. Some may see the “mouse” as a friendly pet hamster offering comfort and security to otherwise, lonely and isolated people. Researchers such as Begley (2014) and Kranjc (2011) expound the virtues of social media as the favoured and least anxiety provoking means of social communication for many autistic people.
However others envisage the internet as a dangerous rabid rat looking for an
opportunity to wreak havoc and mayhem onto communities and ruin lives
(Ledingham and Mills 2015; McCoogan 2016).
This article will explore the middle ground by raising awareness of the risks that social media and IT in general can pose to autistic people, whilst highlighting the advantages that technology can bring to the socially isolated if used appropriately.


Hacking
The names Gary McKinnon (Ledingham and Mills 2015) and Laurie Love
(McCoogan 2016) most famously exemplify the difficulties that arise when
autistic people get embroiled in accusations of hacking. Both men
respectively faced, and are facing, very long prison sentences in the USA
because of allegedly hacking into various secure computer systems e.g.
Federal Reserve, US Army and NASA.
In 2012, the then Home Secretary, Theresa May, intervened in the Gary
McKinnon case stating he was a “suicide risk” and not to be extradited
(McCoogan, 2016). Due to a change in law giving all extradition powers to
the justice system, Laurie Love has to convince a judge that he is not fit enough to be extradited (not achieved as of 12/2016). As a consequence,
Love faces extradition and a maximum of 99 years in an American jail
(McCoogan 2016; Joseph 2016, b). McKinnon and Love have both been diagnosed as autistic whilst being investigated for computer criminal activity (Ledingham and Mills 2016). Kushner (2011) refers to the term “Autism Defence” in which an autism diagnosis is utilised as a means of escaping trial or receiving a lenient sentence. The American legal system have made it clear that they feel this tactic is being used by Loves Defence Team (Joseph, 2016, a). Alternatively, the process of McKinnon, Love and others going through the criminal justice process has highlighted an otherwise unrecognised and undiagnosed condition. Ledingham and Mills (2016) suggest financial gain is not the hackers motivation. It is:
 attention
 adulation
 self-satisfaction
 recognition.
These factors suggest low confidence, something often found in young
autistic adults (Howlin, 1997). One approach is to concentrate on building
self-esteem through childhood, whilst another is to channel the person`s
computer skills into something positive (Begeley, 2014, Batey and Comer,
2013).


Cyberbullying
Being online can present a small risk to all of us; being autistic increases the
risk of exploitation (Arora 2014):
 Underage autistic children being tricked into sharing pornographic
images that are used to humiliate and bully (Levine 2013).
 Building friendships with who they think are teenagers with similar
worries and interests, but who are in reality mature adults (Levine 2013).

 Sending “personal and sexual photographs to a trusted and seemingly
committed person who turns the images into a “sick joke” (Levine
2013). Cyber bullying is potentially a huge problem for some autistic people
(Romano et al, Batey and Comer 2013), whether directly from on-line forums
or from people using social media to increase the scale of bullying (Arora
2014).


Parental roles
Initially the use of parental controls appears to solve many problems with
regard to protecting children from content deemed “unpleasant” or
“inappropriate”. However, does the “parental control” route work short-term
or long-term? Levine (2013) gives an example of a 10 year old boy being
able to bypass these safety measures. There is also a risk that parents
become complacent and stop taking an interest in their child’s PC or phone
activities. In the majority of cases the use of IT, video games and social media in moderation are positive activities, as long as sensible guidelines are set and
enforced by responsible adults. Be clear about what is acceptable, and
open about monitoring and checking websites (Arora (2014), Levine 2013).
Most parents want to know what their child has been doing, and with whom,
if they are out for the evening. They would often do safety checks
beforehand e.g. “where, who, how long?” Have the same openness
regarding computer friends and activities as you would with traditional
socialisation (Levine 2013). Sudden interest, due to concern, can be
misinterpreted as interference or a lack of trust. Levine (2013) broaches the issue of when is a person old enough to be trusted? This question can open up a can of worms regarding informed consent, particularly for parents who have autistic offspring who eighteen years are over. Should parents, in a position to do so, enforce this on adults because of a perceived need to protect them (Arora 2014)? Whilst not perfect there is sense to Levine`s (2013) suggestion of parents sharing internet experiences with their children and having regular open discussions with them about safety. As the internet means so much to many autistic children, parents taking an interest in it would appear natural, supportive and a way to develop the parent/child bond.

Addiction
Another concern for parents of autistic children and adults is that of
internet/gaming/social media dependency. Autistic people appear to be at
higher risk than others of addiction to, and compulsive use of, social media
(Finkenauer et.al. 2012). Clearly an autistic person facing daily challenges
understanding and communicating in the “real world”, may find sanctuary in
a world that appears safe and offers an opportunity to meet and
communicate comfortably with people (Shane-Simpson et al 2016).
Research suggests that a person with “autism traits” experiencing anxiety
and/or depression are more prone to internet addiction (Ramano 2014).
Mazurek and Wenstrup (2013) elaborate on this, warning that there is a risk
that pathological use of internet games can lead to anxiety, social phobia
and depression as well as impacting negatively on school attainment.

Benefits
Many autistic people report feelings of loneliness and isolation due to
difficulties in social interaction (Begley 2014). A number of autistic children
and adults find communicating via a computer much less stressful and a
more enjoyable experience than traditional ways of maintaining friendships
(Begley 2014). No two friendships are the same so why negatively judge ones
that occur on line? Levine (2013) argues that online friendships/relationships are hard for the pre-dawn internet era to understand. However, is it harder to comprehend thanfriendships/relationships maintained by letter often with weeks/months between each response. At least social media enables an almost instant response. If people who have been lonely and isolated suddenly find a way to have friends, what is the benefit of passing value judgements on the validity of those friendships? The internet is a vital tool in terms of communicating with autistic people and their families and carers. It enables people to realise that they are not alone, as well as offering support when no one else is able to (Begley 2014, Arora 2014). It enables organisations struggling with resources to reach more people in quicker timescales. Online support is available 24/7, not just office hours. Being able to send emails after the children are settled, when at a low ebb, and knowing that you will receive support from someone with similar experiences can enable you to cope!


Conclusion

This article has highlighted both positive and negative impacts that the
internet etc. can have on some autistic people and their families. It has
discussed issues that may arise for parents with autistic children and has
outlined some strategies. If used appropriately and in moderation computers
can be of great benefit to autistic people in terms of offering one form of
socialisation. It can be beneficial for parents and carers in terms of accessing information and support, and of being able to share their child`s interest. Yes negative things can happen, but there are risks in all aspects of life. Are social media risks actually harder to predict than being mugged in your street, attacked in town by a gang or bullied at school? If we stopped using all inventions because there are risks or because they are hijacked by people for crime or to hurt others, life would stagnate. The positive thing about computers is that serendipity has meant that theyare potentially the greatest ever asset for autistic people. They open up a new world of potential: friends, opportunity and employment. It is perhaps the non-autistic world who has concrete thinking and needs to accept change in terms of redefining friends and socialising to include social media. The internet will not disappear so everyone must work together to make it infinitely positive and beneficial for autistic people. This is their great opportunity for choice and a more level playing field!

Monday, 08 April 2024 – Sunday 14 April. Seven day Major line closure

Improvement Works – seven day Major Line Closure Monday 8 to Sunday 14 April   

The seven day line closure is needed so we can replace over 5.6km of overhead power lines and carry out secondary works.  

During the closure buses will replace trains between Benton and North Shields in both directions.  

Replacement bus service 900
You’ll still be able to make your journey as the replacement bus service number 900 will call at or close to all stations between Four Lane Ends and North Shields.  You may find it easier to transfer from Metro to the replacement bus at Four Lane Ends instead of Benton, as Four Lane Ends is an interchange station.  Some of the buses may begin/end service outside of these areas, please view the replacement bus timetable for details. 

Metro tickets and passes will be valid on the replacement bus, or you can buy your ticket from the bus driver. If you have a smartcard remember to touch in and out at the start and end of your journey.  

Journey times on the replacement bus will be longer than on Metro, and the buses may be affected by road congestion, but we’ll do all we can to keep to the planned bus timetable.  Your journey will take longer especially if transferring between more than one mode of transport.  Please check train and bus times before travelling.

Train service
During the closure trains will be running frequently elsewhere on the system to a revised timetable (areas shown below).  Please check train times before travelling.

  • Airport-South Hylton / South Hylton-Airport
  • St James-North Shields / North Shields-St James
  • Benton-South Shields / South Shields-Benton

Trains will return to service between Benton and North Shields on Monday 15 April.  

View the latest service updates or get service notification by using the Pop app.  

Our neighbours near the line
Residents and businesses close to the Metro line may experience work taking place nearby including night-time work and an increase in activity by our teams. However we aim to keep noise levels to a minimum.  If you’d like to receive the night-time working schedules you can sign up to receive regular emails here

If you have any questions or concerns about the work taking place, please email us at customerrelations@nexus.org.uk. or call us on 0191 20 20 747 (lines are open Monday to Friday, 9.00am to 5.00pm).