0% found this document useful (0 votes)
2 views

Module 2 Final

PROF ED 5 module

Uploaded by

vilmabendoloquil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Module 2 Final

PROF ED 5 module

Uploaded by

vilmabendoloquil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

22

2 : ICT Policies and Issues: Implications to


Teaching and Learning

Lesson 1: ICT Policies and Issues on Internet and Implications to


Teaching and Learning

This module will be discussing the ICT Policies and Issues where Globalization is a reality
and ICT has become a fundamental part of the process. A networked society is one which the
entire planet is organized around telecommunicated networks of computers. The powerful use
network has broken boundaries, provided opportunities for inclusion and collaboration.
However, there will also be a struggle for those who do not have access of those who are
excluded, marginalized and powerless. Thus, a need to establish policies in the use of ICT is
imperative.

As the Department of Information, Communication and Technology (DICT) says: “The


future has arrived. Now we have to ensure that we have a place in it.

Lesson outcomes:

1. Name examples of ICT Policies which are applicable to teaching and learning.
2. Discuss some issues that relate to the ICT policy

Technology for Teaching and Learning 1


23

Assume yourself as an investigator who would like to inform your friends and classmates about
the current issues on technology.
With you, search the web and find out articles or cases about:
A. Freedom of Expression and Censorship
B. Privacy and Security
C. Surveillance and Data Retention
D. e-pollutants from e-waste

Among the given articles or cases, choose only one or two articles or cases that you will work
on. Use the template below to answer. Submit your output t your instructor.

Title of the Issue: (Example Privacy and Security)


Title of the Article: _____________________________________________________
Source: ______________________________________________________________
Author: ______________________________________________________________

Summary Narrative of your answer

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

What lesson have you learned?

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

Technology for Teaching and Learning 1


24

What suggestion could you give?


_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

This Activity will focus on the Policies and Issues on Internet and Implications to Teaching
and Learning.

1. What are the potential implications of the Internet to education and learning?

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

2. How important the internet for the learning and teaching?

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Technology for Teaching and Learning 1


25

3. Make your own analyzation on the Policies and Issues on Internet and Implications to
Teaching and Learning.

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

One way of enhancing and regulating the use of ICT is to formulate and implement
policies to guide appropriate decisions.

Definition of ICT Policy

The oxford English Dictionary has defined “policy” as a course of action, adopted and
pursued by a government, party, ruler, state man. It is any course of action adopted as
expedient or advantageous. Its operational definition of policy is a plan of action to guide
decisions and achieve outcomes.
Thus, ICT Policies are needed to put a roadmap or course of actions to be pursued and adopted
by various government, organizations, and entities involving ICT. These include principles and
guidelines in the use of ICT which cover three main areas: telecommunications (telephone),
broadcasting (radio and television) and Internet.

The new ICT Technologies

More recent technological innovations increased the reach and speed of


communications which can be grouped into the three categories:

Information Technology- includes the use of computers, which has become indispensable in
modern societies to process data and save time and effort. What are needed will be
computer hardware and peripherals, software and for the user, computer literacy.

Technology for Teaching and Learning 1


26

Telecommunication technologies-include telephones (with fax) and the broadcasting of radio


and television often through satellites. Telephone system, radio and TV broadcasting are
needed in the category.

Networking Technologies-The best known of networking technologies is Internet, but has


extended to mobile phone technology, Voice Over Internet Protocol) VOIP) satellite
communications and other forms of communications are still in their infancy. In addition to the
internet, this category also includes mobile telephone, cable, DSL, satellite and other broadband
connectivity.

The DICT Roadmap

In our country, the Department of Information and Communication Technology (DICT)


has formulated a roadmap to guide all agencies in the utilization, regulation and enhancement
of ICT. Each project has a corresponding policy statements and guidelines.

The ICT of Education (ICT4E) is a program under the DICT that supports all the efforts
of the education sector in incorporating the use ICT as well as in determining and gaining
access to the infrastructure (hardware, software, telecommunications facilities and others) which
are necessary to use and deploy learning technologies at all levels of education. Among the
policy recommended programs that have applications teaching to education teaching-learning
are:

1. ICT in Education Master plan for all levels, including a National Roadmap for Faculty
Development in ICT in Education. A National Framework Plan for ICTs in Basic
Education was developed.
2. Content and application development through the Open Content in Education Initiative
(OCEI) which converts DepEd materials into interactive multi-media content, develop
applications used in schools, and conduct students and teachers’ competitions to
promote the development of education-related web content.
3. PhedNET, is a “walled” garden that hosts educational learning and teaching materials
and applications for use by Filipino students, their parents and teachers. All public high
schools will be part of this network with only DepEd-approved multi-media
applications, materials and mirrored internet sites accessible from school’s PCs.
4. Established Community eLearning Centers called eSkela for out of -school youth (OSY)
providing them with ICT-enhanced alternative education opportunities.
5. eQuality Program for tertiary education through partnership with state universities and
colleges (SUCs) to improve quality of IT education and the use of ICT in education in the
country, particularly outside of Metro Manila.
6. Digital Media Arts Program which builds digital media skills for government using Open
Source technologies. Particular beneficiary agencies include the Philippine Information
Agency and the other government media organizations, the Cultural Center of the
Philippines, National Commission for Culture and Arts and other government art
agencies, State Universities and Colleges and local government units.

Technology for Teaching and Learning 1


27

7. ICT Skills strategic plan which develops an inter-agency approach to identifying strategic
and policy and program recommendations to address ICT skills demand-supply type.

All the seven programs were guided by the roadmaps that embed policy statements that
relate to education specifically in the enhancement of human development foe teaching and
learning.

Some Issues on ICT and Internet Policy and Regulations

Global Issues

Access and Civil Liberties are two sets of issues in ICT Policy which are crucial to the
modern society. The other concern is civil liberties which refer to human rights and freedom of
expression, the right to privacy, the right to communicate and intellectual property rights.

Access to the Use of Internet and ICT. Access means the possibility for everyone to use
the internet and the other media. In richer countries, basic access to internet is almost available
to all with faster broadband connections. There are still countries where access to internet is still
a challenge.

Infringement to Civil Liberties of Human Rights. What are specific internet issues on
internet policy that have relationship to civil liberties of human rights? Let’s study the examples
that follow.

Issue No. 1: Freedom of Expression and Censorship

Under international human rights conventions, all people are guaranteed the rights for
free expression. However, with the shift from communicating through letter, newspapers and
public meetings to electronic communications and on-line networking, a need to look into how
these new means modifies the understanding of freedom of expression and censorship.

The UN Universal Declaration of Human Rights provides that everyone has the right to
freedom of thought, conscience and religion, likewise the right to freedom of opinion and
expression. However, there are practices that violate this provision in the use of internet.

Some examples are the following:


1. Individual rights are given up in order to have access to electronic networks.
Microsoft Network’s (MSN’s) contracts provide protection of individuals like “upload,
or otherwise make available files that contain images, photographs or other materials
protected by intellectual property laws, including but not limiting to copyrights thereto
or have received all necessary consents to do the same.” However, Microsoft
reserves the rights, in its sole discretion, to terminate access to any or all MSN sites
or services.

Technology for Teaching and Learning 1


28

2. Censorship restricts the transmission of information by blocking it or filtering the


information. Blocking is preventing access to whole areas of internet based upon the
“blacklist” of certain Internet address, location or email addresses while filtering is
sifting the packets of data or messages as they move across computer networks and
eliminating those considered “undesirable “materials. The selection of sites that are
blocked or filtered has been considered as an issue.
3. Defamation actions may be used to silence critics. This action deters the freedom of
expression.

Issue No.2: Privacy and Security

Privacy policies are an issue. Most commercial sites have a privacy policy. When someone
uses a site and clicks “I agree” button, it is as if you have turned over private information to any
authority that may access it.

There are several types of privacy as shown by the following examples:

1. For most, privacy means “personal privacy” the right of individuals not to have their
home, private life or personal life interfered with.

2. Privacy of communication refers to the protection of the interference with communication


over the phone or internet Respect for privacy of communications is an essential prerequisite for
the maintenance of human relationship via technological communications media.

3. Information privacy is related to the use of computers and communications system which
are able to hold and process information about large numbers of people at a high speed. It is
important to ensure that information will only be used for purposes for which it was gathered and
will not be disclosed to others without consent of the individuals.

Issue No. 3: Surveillance and Data Retention

The use of electronic communication has enhanced the development of indirect


surveillance. In the indirect surveillance, there is no direct contact between the agent and the
subject in surveillance but evidence of the activities can be traced. The new and powerful form
of indirect surveillance is dataveillance. Dataveillance is the use of personal information to
monitors a person’s activities while data retention is the storage and use of information from
communication systems.

There is very little that can be done to prevent surveillance. What can be done is to change
the methods of working to make the surveillance difficult. This is called “counter surveillance” or
“information security” if it refers to computers and electronic communication.

Issue No. 4: E-pollutants from E-waste

Large amount of e-waste is generated by ICT. These are in particular, terminal equipment
used for computing (PCs, laptops), broadcasting (television and radio sets), telephony (fixed
and mobile phones), and peripherals (fax machines, printers and scanners).

Technology for Teaching and Learning 1


29

The accumulated e-waste is due to rapid turnover of equipment due rapid improvement of
software. While material waste can be destroyed by crushing, toxic material brought about by
the different equipment requires utmost management. The quantities of e-waste are increasing
in both developed and developing countries. A very dismal state is that there is a significant
amount of electronic waste that has been shipped from industrial countries to developing
countries, using less environmentally - responsible procedure.

Remedies include standardization and regulatory measures to increase the life cycle of
equipment before they become obsolete. Efficient extraction of toxic components and requiring
the recycling by both consumers and equipment vendors are selling must be required.

If not controlled then, e-waste will tremendously affect climate change, damage human lives
and overload the capacity of the earth in carrying solid waste.

Reflection:

From your chosen articles or cases write your reflection. Submit this accomplished task to your
instructor.

Name: _______________________________________________Year/Section: ____________


Date Accomplished: _______________________________

Topics: Issues on ICT


A. Freedom of Expression and Censorship
B. Privacy and Security
C. Surveillance and Data Retention
D. e-pollutants from e-waste

Task:

In the panel forum, I as a future teacher…

1. Learned that
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

Technology for Teaching and Learning 1


30

2. Realized that
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

3. Plan to
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

Choose the letter of the correct answer.

1. What is the importance of ICT Policy for teaching and learning?


a. It provides a road map in education where ICT is utilized
b. It censors all the activities of schools so that it will be uniform in ICT use.
c. It is a requirement of the DICT in the Philippines.
d. It serves as a basis for closing internet cafes near the schools

2. Which of the following does NOT belong to the cluster of technologists?


a. Telecommunication technology
b. Information technology
c. Networking technology
d. Industrial technology

3. The DICT Policy statements include the creation of all the following programs, EXCEPT
_________.
a. eQuality
b. eSkwela
c. ICT Pedagogy
d. iSchoolWebBoard

4. Which of the following issues on ICT is directly linked to climate change?


a. Freedom of Expression

Technology for Teaching and Learning 1


31

b. Surveillance
c. e-waste
d. privacy

5. As a teacher, how will you appropriately use technology for teaching and learning so that
your learners will benefit most?
a. Assign them to search in the web all the topics you are teaching
b. Maximize the use of technology tools as your support in teaching
c. Ask each student to buy a gadget that they can use
d. Make your lessons an open source all the time

Technology for Teaching and Learning 1


32

Lesson 2: Safety Issues on the Use of ICT including e-Safety Rules

Using technology is not a risk by itself, but how it is used will be vulnerable to risk. When
improperly used, it will pose danger to the users in school and at home. What are the safety
issues that are needed to be addressed by safety policy and guidelines? As future teachers, do
you need to know all of these?

Lesson outcomes:

1. Identify and explained safety issues on the use of ICT


2. List and apply e-safety rules in the use of ICT.

Give at least 5 e- Safety Rules in Schools. Why e- Safety Rules are important? How is e- safety
rules are implemented in school? Why is it important to learn about e- safety?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Technology for Teaching and Learning 1


33

1. How important are the aspect of e-safety as strategic leadership within the school?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

2. Give at least one rule of e-safety that is being used in ICT. Explain that rule precisely
and concisely.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

Some Risks in the Use of ICT and e-Networking

Technology is a phenomenon that seems to be uncontrollable. Despite the so many


benefits for teaching and learning, there are also negative effects or influence on the learners.
Hence as future teachers you have to be aware of how to safeguard learners in the school
communities where they spend most of their waking hours and also in their homes or facilities
that provide opportunities to used digital technologies like Internet cafes. Safeguard and
protection should be the primordial role of parents, teachers and school. There are so many

Technology for Teaching and Learning 1


34

risks that we have to be aware of in the use of digital technologies. These may include the
following:

1. Exposure to inappropriate content, including on-line pornography, extremism


(exposure to violence associated with racist language);

2. Lifestyle websites like self-harms and suicide sites, and hate sites;

3. Cyber-bullying in all forms, receiving sexually explicit images or messages;

4. Privacy issues including disclosure of personal information;

5. Health and well-being (amount of time spent on-line, internet gaming and many more;

6. Prolonged exposure to on-line technologies, particularly at an early age;

7. Addiction to gambling and gaming;

8. Theft and fraud from activities such as phishing;

9. Viruses, Trojans, spyware and other malware; and

10. Social pressure to maintain online networks via texting and social
networking sites.

Minor Misuse of ICT

In school, some minor misuse made by learners includes the following;

 Copying information into assignment and failing to acknowledge the source (plagiarism
and copyright infringement).
 Downloading materials not relevant to their studies.
 Misconduct associated with subject logins, such as using someone else’s password.
 Leaving a mobile phone turned on during class period.
 Unauthorized taking of pictures or images with mobile phone
camera, still or moving.

E-Safety

With all of the above concerns and many more, how do we confront all of these so as to
protect our future generation?

E-safety takes care not only of internet technologies but also of electronic communications
via mobile phones, games consoles and wireless technology. It highlights the need to educate
children and young people about the benefits, risks and responsibilities of using information
technology. Here are some issues of e-safety:

 e-safety helps safeguard children and young people in the digital world;
 e-safety emphasizes learning to understand and new technologies in a positive
way;

Technology for Teaching and Learning 1


35

 e-safety educates children about the risks as well as the benefits so we can feel
confident online; and
 E-safety supports young learners and adults to develop safer online behaviors,
both in and out of school.

Network Management

1. Safety in the Use of Network in Schools


1.1. Make clear that no one should log on as another user.
1.2. Requires all users to always log off when they have finished working.
1.3. Maintain equipment to ensure health and safety.
1.4. Provide students with access to content and resources through guided e-learning.
1.5. Set up a clear disaster recovery system and place for critical data that include secure,
remote back up of critical data.
1.6. Secure wireless network to appropriate standards suitable for educational use.
1.7. Install all computer equipment professionally and meet health and safety standards.
1.8. Review the school ICT system regularly with regard to health and safety and security.

2. Password Policy

2.1 Only authorized users will have individual password. User are not permitted to disclosed
their password unless they permission from the owner or from the management. The
equipment that keeps the personal information shall be locked when unattended to
prevent unauthorized access.

Computer should be set to a time out if they become unused for a certain period of time.

3. Personal mobile phones and mobile devices

3.1. All mobile phones shall be kept away in a box away from the children or learners and
access is only allowed at break-time or at the end of classes or when needed during the
class period.

4. Cameras

4.1. Taking pictures only from parents or caregivers and not from any other family
member or friend while the child attends class.

4.2. Any picture taken of children shall be on cameras solely for the purpose.

Setting Up an Educational Technology Room

Schools that plan to dedicate a room where the students can access technologies for
learning should include the following basic safety rules:

Technology for Teaching and Learning 1


36

1. Provide tillable tables. These tables can tilt and adjusted to the height or the users.
2. Provide anti-glare screen filters
3. Provide adjustable chairs.
4. Provide foot support.
5. Make sure lighting is suitable.
6. Make sure work stations are not cramped.
7. Plan work at a computer so that there are frequent breaks.

More specifically safety rules that can reduce risk of accidents in the working stations
should include;

1. No trailing wires across or around the room which people can trip on.
2. Electrical sockets should not be overloaded.
3. Electrical equipment should be safety-tested at least once a year.
4. There should be adequate space around desk for people to move.
5. Bags and obstacles should be stored out of the way.
6. Food and drinks should not be placed near machines.
7. Heating and ventilation should be suitable for the working environment.
8. Fire extinguishers should be available.
9. Fire exist should be clearly marked and free from clutter.

Let’s share your thoughts. Share your thoughts in separate sheet of short size bond paper.

Reflection:

1. What have you learned?


____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

2. What do you want to know more?

____________________________________________________________________________
____________________________________________________________________________

Technology for Teaching and Learning 1


37

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

3. What will you do with what you learned?


____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Choose the letter of the correct answer.

1. A friend would like to ask for your email password because your email address was used
for an urgent matter. As a rule in privacy, what action will you take?
I. Voluntarily give my password to my friend.
II. Deny the request of my friend even it is urgent.
III. Open my email by myself and print the email address to my friend.
a. I only c. III only
b. II only d. I, II and III

2. Which of these is a minor infraction in the use of digital facility??


a. Unauthorized taking of pictures or images with mobile phone camera
b. Logging off when finished working
c. Making sure that lighting is adequate
d. Using anti-glare screen filters

3. Which is risk in the use of ICT, thus a need to establish policies and rules for e-safety?
I. Prolonged exposure to online technologies, particularly at an early age
II. Cyber bullying in all forms

Technology for Teaching and Learning 1


38

III. Lifestyles websites like self-harms and suicides sites, and hate sites
a. I only c. III only
b. II only d. I, II and III

4. Which is NOT TRUE about e-safety in the use of digital technology?


a. Restricts the use of digital technology
b. Facilitates better understanding how to use online facilities
c. Protects young learners and adults from digital risk
d. Helps users to understand the new technology

5. When working inside a computer laboratory, all of the choices EXCEPT one is allowed.
Which one is allowed?
a. Foods and drinks should be handy on the computer table.
b. One external electrical outlet should have 5 computers connected.
c. Fire extinguishers should be made available.
d. Computer desks should be near each other to allow sharing of information.

Technology for Teaching and Learning 1

You might also like