Skip to content
English Language · Secondary 2

Active learning ideas

Algorithms and Echo Chambers

Active learning helps students see how algorithms shape their feeds by making invisible processes visible. When students simulate curation or audit their own feeds, they move from abstract ideas to concrete evidence of personalization in action.

MOE Syllabus OutcomesMOE: Information Literacy and Evaluation - S2MOE: Critical Reading and Media Literacy - S2
20–45 minPairs → Whole Class4 activities

Activity 01

Pair Simulation: Mock Algorithm Curation

Pairs receive a set of 10 articles on a neutral topic like school rules. One partner acts as the algorithm, selecting and passing only reinforcing articles based on the other's initial 'like.' Switch roles after 10 minutes, then discuss how views narrowed. End with a shared reflection sheet.

How do algorithms create echo chambers that reinforce existing beliefs?

Facilitation TipDuring Pair Simulation, circulate and ask each pair to share one example of a feed item they agreed was algorithmically driven, then ask another pair to challenge their reasoning with counter-evidence from their own screenshots.

What to look forPose the question: 'Imagine you are a digital literacy advocate. How would you explain the concept of a filter bubble to a younger sibling using an analogy they can easily grasp?' Facilitate a class discussion where students share their analogies and explain their reasoning.

RememberUnderstandAnalyzeSocial AwarenessSelf-AwarenessDecision-Making
Generate Complete Lesson

Activity 02

Outdoor Investigation Session45 min · Small Groups

Small Group: Feed Audit Challenge

Groups of four screenshot their social media feeds on a current event. They categorize content for bias, trace patterns to past interactions, and map missing viewpoints. Present findings to class with evidence from screenshots.

Explain the concept of a 'filter bubble' and its implications for critical thinking.

Facilitation TipIn Feed Audit Challenge, assign pairs specific platforms so they compare notes on how each app curates content differently, highlighting the limits of personalization.

What to look forPresent students with two hypothetical social media feed descriptions, one clearly showing signs of an echo chamber and the other more diverse. Ask students to identify 2-3 specific elements in each feed that indicate algorithmic influence and explain why those elements contribute to or counteract echo chamber effects.

RememberUnderstandAnalyzeSocial AwarenessSelf-AwarenessDecision-Making
Generate Complete Lesson

Activity 03

Outdoor Investigation Session40 min · Whole Class

Whole Class: Bubble Burst Strategy Role-Play

Divide class into teams representing algorithm-driven users. Each team role-plays daily routines, then brainstorms and acts out three strategies like following diverse accounts or using incognito mode. Vote on most effective via polls.

Design strategies to break out of an online echo chamber.

Facilitation TipFor Bubble Burst Role-Play, assign roles that force students to argue for viewpoints they personally reject, then debrief on how the exercise revealed their own biases.

What to look forOn a slip of paper, have students write down one specific action they can take this week to intentionally seek out information or perspectives that differ from their own online. Ask them to briefly explain why this action might help them break out of an echo chamber.

RememberUnderstandAnalyzeSocial AwarenessSelf-AwarenessDecision-Making
Generate Complete Lesson

Activity 04

Outdoor Investigation Session20 min · Individual

Individual: Personal Escape Plan

Students reflect on their own feeds, list three echo chamber signs, and design a weekly plan with specific actions like reading opposing editorials. Peer review plans before submission.

How do algorithms create echo chambers that reinforce existing beliefs?

Facilitation TipHave students annotate their Personal Escape Plan with sources they plan to seek, then trade plans with a partner to check feasibility before final submission.

What to look forPose the question: 'Imagine you are a digital literacy advocate. How would you explain the concept of a filter bubble to a younger sibling using an analogy they can easily grasp?' Facilitate a class discussion where students share their analogies and explain their reasoning.

RememberUnderstandAnalyzeSocial AwarenessSelf-AwarenessDecision-Making
Generate Complete Lesson

A few notes on teaching this unit

Start by acknowledging students’ existing trust in algorithms as helpful tools, then use their real feeds as data to test that trust. Avoid lecturing about bias; instead, guide students to discover it through comparison and contradiction. Research shows that personal relevance accelerates learning, so connect algorithmic curation to their daily scrolling habits rather than hypothetical cases.

Students will recognize algorithmic influence in their feeds, explain how echo chambers form, and apply at least one strategy to diversify their information intake. Success looks like students using evidence from activities to challenge assumptions about balanced content.


Watch Out for These Misconceptions

  • During Pair Simulation, watch for students assuming their paired screenshots represent all users equally.

    Have pairs compare their screenshots with another pair’s to highlight how personalization differs even among friends, then ask them to explain why these variations exist.

  • During Feed Audit Challenge, watch for students attributing all differences in their feeds to personal choice rather than algorithmic curation.

    Guide students to mark each feed item with whether it appeared due to their own actions or the algorithm’s prediction, using highlighters to visualize algorithmic influence.

  • During Personal Escape Plan, watch for students suggesting passive actions like 'scroll more' to escape bubbles.

    Require students to include at least one active strategy such as following opposing viewpoints or setting time limits on certain apps, and justify how these actions break reinforcement loops.


Methods used in this brief