Minimizing of Ict: Abuse
Minimizing of Ict: Abuse
Structure
2.1 Introduction
2.2 Objectives
I
2.3 Abuses of ICT
2.4 Role of Teacher: Towards Safe Use of ICT
2.5 Role of Teacher: Creating Awareness among Students for the Safe
Use of ICT
2.6 Role of Teacher: Creating Awareness among Parents for the Safe
Use of ICT
7 Let Us Sum Up
8 Answers to Check Your Progress
I
9 References 1
1- INTRODUCTION I
11,is needless to say anythmg- about the potentiality of the ICT and its requirement
in work place. You and your students might be using ICT for preparing school
assignment, completion of project, learning new skills, research, communication
with friends and peers, and entertainment. Both you and your students might be
more fiequently and heavily relying on Internet than other ICT tools to perform
the above mentioned task. The probable reason may be that Internet is a powerfid
resource enabling people of all ages to learn and communicate in a myliad of new
ways for children, growing up in a world where the Internet has always been
available. It is an essential tool. They are the 'digital natives'- always surrounded
'by online technology, and using the Internef from an increasingly early age. However,
acldiction to the use of ICT on part of students put themselves in risky situations.
In this unit, we will discuss the various abuses of ICT by students and the roles
of' teacher and parents to minimise the abuse of ICT.
2.2 OBJECTIVES
Aiter studying the unit, you will be able to:
(I identify the sources and types of abuse that takes place through ICT;
f ' recognize and avoid the hidden dangers of ICT in teaching-learning process;
/1
provide the practical advice to students for safe use of ICT at school and
home; and
1 create awareness among parents about different types ICT abuse and its
19
I precautions
ICT a d Value Development
2.3 ABUSES OF ICT
The availability and accessibility of ICT have helped students in performing
learning tasks in a more effective and efficient manner. But very oRen students
get addicted to the use of ICT and indulge themselves in various kinds of abuses.
Some of these abuses are the following:
The outcomes of such innocent activities of the children are forcing parents and
guardians to pay heavy price i.e. online harassment, suicide and depression etc.
You might be aware from the national media that there have been a number of
high profile cases recently regarding child protection and the abuse of the internet
and mobile phones. In this situation your duty is very vital as a teacher and a
responsible citizen of the society to guard against the abuse of ICT by the
students at school, at home and also in public places.
b) Use Filtering Software: If you don't want your students to check each and
every site on the internet, then the use of filtering software limits access of
students to certain sites, words, or images.
Review a website before using it. How old is the information? Who wrote
it? Does the website have contact details, privacy policy or copyright
statement?
If not, find another website and advise students to use several sources of
information and compare them.
Under no circumstances you or your staff should give personal mobile numbers
or e-mail addresses to students. If tuition is to take place via computer, make
sure this is done through school based computer equipment. Never involve
yourself in personal text messaging.
Remember that if you or others load images of your self on the Internet, they
will remain there and may find their way into Internet searches prior to
interview.
I Always check with their parents before registering at a website, even if the
site is free.
Never give out credit card information without parents' permission.
Never send their photos over the Internet without their parents' permission.
Above all, they should keep the lines of communication open. Children
need to be confident that they can talk to their parents about what's
happeniw.
b
b) How to use mobile phones safely: Mobile phone is a common electronic
gadget these days. Many crimes and exploitations are happening through this
simple handset. It is very essential that parents need to be informed how well
they use the cell phone and also teach their children to think about safety
when using a cell phone. This includes:
Use photo and video-sharing by phone with care: Parents should
encourage their children to think about their privacy and that of others
before they share photos and videos via cell phone. It's easy to post
photos and videos online without the knowledge-let alone the OK- of
the photographer or the person in the shot. It could be embarrassing
and even unsafe.
Use good judgment with mobile social networking: Many social
networking sites have a feature that allows users to check their profiles
and post comments from their phones, allowing access from anywhere.
That means the filters they have installed on their home computer won't
limit what kids can do on a phone. Thus they should talk to their
children about using good sense when they are engaged in social
networking from their phones.
Get familiar with social mapping: Many mobile phones now have GPS
technology installed: kids with these phones can pinpoint where their
friends are-and be traced by their friends. Advice kids to use these
features only with friends they know in person and trust.
Be smart about smart phones: Many phones include web access. If
children are going to use a phone and parents are concerned about
what they might find on the net, they should turn off web access or turn
on filtering.
I
t Develop cell phone rules: Parents should talk to their children about
i when and where it's appropriate to use cell phones. They can also
establish rules for mobile use- like not to allow use of cell phones during
dinner, late night or during home work.
Set an example: Parents should be informed that they should be an ideal
cell phone user before their children. So they should avoid using cell
phone-texting, surfing, or t a h g during driving, etc.
e) How to minimize SPAM: Any library user, including children with a personal
e-mail address or mobile phone, can receive unwanted messages and
attachments which can carry viruses or the sending of a large amount of
unwanted information to crash somebody's computer. These are called spam.
Spam messages may be appropriate, offensive or contain computer viruses.
They frequently promote products or services, but can simply be a message
26 claiming to be from a 'seat$admirer or friend'. Responding to these messages
can lead to further sparn. Thus parents should be informed and oriented in Generatinghwareness:
MinimisingAbuse of ICT
the following ways how to deal with the spam:
Teaching the kids never to open an e-mail message unless they know
who the sender is.
Helping the kids in recognizing SPAM prior to opening the message
and transfer the unopened messages to the trash file. SPAM is usually
pretty easy to recognize. The sender's name is usually disguised,
frequently with lots of numbers. The subject lines contain fascinating
"enticements," such as: "Make money at home. ""You just won." "See
my new web site." "A special message for you." "Look at my new
girlfriend." When SPAM messages are opened, they immediately display
inappropriate material.These messages should be immediately transferred
to the trash file without opening.
If the sparn is sent via a mobile phone, it is best not to open attachments
from unknown sources. Computer viruses are designed to destroy files
in a computer system.
The receipt of pornographic SPAM or any other sexually explicit e-mail
by kids should be treated as a criminal matter. Such actions are likely
to be in violation of criminal laws. The police should be informed of
this.
2.9 REFERENCES
Aftab, Parry, (2000). 'The Parents Guide to Protecting Your Children In
Cyberspace ', McGraw Hill Publishing Co., Maidenhead, Berkshire, U.K.
Ahn, J. and Randall, G (2007). Computer Game Addiction. Available at: http:/
1andrewd.ces. clemson. edulcourseslcpsc414/spring07/chp/team3.pdf
Amici, Curiae (2001). Effects of violent video games on aggressive behaviour,
aggressive cognition, aggressive affect, physiological arousal and pro social
behaviour: a meta-analytic review of the scientific literature. Psychological
Science,l2 (5) pp.353-359.
Anderson, C. and Bushman (2001). Effects of violent video games on aggressive
behaviour, aggressive cognition, aggressive affect, physiological arousal, and Generating l\wareness:
prosocial behaviour. A meta-analyhc review of the scientific li~turePsychological MinirnisingA1,useof ICT
Science, 12, pp.353-359.
Buckingharn, D. and Willett, R. (eds.) (2006). Digital Generations: Children,
Young People and New Media. Mahwah, NJ: Erlbaum.
7