0% found this document useful (0 votes)
9 views

Module-2 (1)

The document outlines ICT policies and issues, emphasizing their implications for teaching and learning, including the need for guidelines on technology use in education. It discusses various ICT technologies, safety concerns, and the importance of e-safety for both teachers and learners. Additionally, it highlights the role of the Department of Information and Communication Technology (DICT) in supporting educational initiatives and addressing global issues related to access and civil liberties.

Uploaded by

claraminguez70
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Module-2 (1)

The document outlines ICT policies and issues, emphasizing their implications for teaching and learning, including the need for guidelines on technology use in education. It discusses various ICT technologies, safety concerns, and the importance of e-safety for both teachers and learners. Additionally, it highlights the role of the Department of Information and Communication Technology (DICT) in supporting educational initiatives and addressing global issues related to access and civil liberties.

Uploaded by

claraminguez70
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

M O D U L E

ICT POLICIES AND ISSUES:


IMPLICATIONS TO
TEACHING AND LEARNING
Module Outcomes:
1. Discussed some ICT policies
and explained their
implications to teaching and
learning.
2. Explained some issues that
relate to ICT policies.
3.Identified safety concerns on
Internet including digital
safety rules.
Department of
Information,
Communication and
Technology (DICT)

“The future has arrived. Now we have


to ensure that we have a place in it.”
l e s s o n

POLICIES AND ISSUES ON


INTERNET AND IMPLICATIONS
TO TEACHING AND LEARNING
Lesson Outcomes:

1. Named examples of ICT


policies which are applicable
to teaching and learning.

1. Discussed some issues that


relate to the ICT policy.
New technologies have
become central to the lives
of every individual in this
planet.
Watching
Talking on news on
the phone television

Using
the
Sending an library
electronic
mail

Going to
the
Going to doctor
the bank Catching a
flight
POLICY
A course of action,
adopted and pursued by a
government, party, ruler,
statesman.
It is any course of action
adopted as expedient or
advantageous. Is a plan of
action to guide decisions and
achieve outcomes.
ICT POLICIES
- Are needed to put a “roadmap”
or course of actions to be pursued and
adopted by various governments,
organizations, entities involving ICT.
These include principles and
guidelines in the use of ICT which
cover three main areas:
telecommunications (telephone),
broadcasting (radio and television)
and internet.
NEW ICT TECHNOLOGIES
1. Information Technology
It includes the use of computers,
which has become indispensable in
modern societies to process data and save
time and effort. What are needed will be
computer hardware and peripherals,
software and for the user,
computer literacy.
2. Telecommunication Technologies
It include telephones (with fax) and the
broadcasting of radio and television often through
satellites. Telephone system, radio and TV
broadcasting are needed in this category.
3. Networking Technologies
The best known of networking technologies is
Internet, but has extended to mobile phone
technology, Voice Over Internet Protocol (VOIP)
satellite communications and other forms of
communications are still in their infancy.
In addition to Internet this category also includes
mobile telephone, cable, DSL, satellite and other
broadband connectivity.
DICT Roadmap
The Department of Information and
Communication Technology (DICT) has
formulated a roadmap to guide all agencies in
the utilization, regulation and enhancement of
ICT.
ICT for Education (ICT4E)
Is a program under the DICT that supports all
the efforts of the education sector in incorporating
the use of ICT as well as in determining and gaining
access to the infrastructure (hardware, software,
telecommunications facilities and others) which are
necessary to use and deploy learning technologies at
all levels of education.
Among the policy recommended programs
that have applications to education teaching-
learning are:
1. ICT in Education Masterplan for all levels,
including a National Roadmap for Faculty
Development in ICT in Education. A National
Framework Plan for ICTs in Basic Education
was developed.
2. Content and application development
through the Open Content in Education
Initiative (OCEI) which converts DepEd materials
into interactive multi-media content, develop
applications used in schools, and conduct
students and teachers competitions to promote
the development of education-related web
content.
3.PheDNEt is a "walled" garden that host
educational learning and teaching materials and
applications for use by Filipino students, their
parents and teachers. All public high schools will
be part of this network with only DepEd-
approved multi-media applications, materials
and mirrored internet sites accessible from
school's PC.
4. Established Community learning Centers
called eSkwela for out-of-school youth (OSY)
providing them with ICT-enhanced alternative
education opportunities.
5. eQuality Program for tertiary education
through partnerships with state universities and
colleges (SUCs) to improve quality of IT
education and the use of ICT in education in the
country, particularly outside of Metro Manila.
6. Digital Media Arts Program which builds
digital media skills for government using Open
Source technologies.
Particular beneficiary agencies include the
Philippine Information Agency and the other
government media organizations, the Cultural
Center of the Philippines, National Commission
for Culture and Arts and other government art
agencies, State Universities and Colleges and
local government units.
7. ICT skills strategic plan which develops
an inter-agency approach to identifying
strategic and policy and program
recommendations to address ICT skills
demand-supply type.
SOME ISSUES ON ICT
AND INTERNET POLICY
AND REGULATIONS
Global Issues
Access and Civil Liberties are
two sets of issues in ICT Policy
which are crucial to the modern
society.
Global Issues
Civil liberties refer to human
rights and freedom. These include
freedom of expression, the right to
privacy, the right to communicate
and intellectual property rights.
Access to the Use of Internet and ICT
Access means the possibility for
everyone to use the internet and other
media. In richer countries, basic access to
internet is almost available to all with faster
broadband connections. There are still
countries where access is still a challenge.
Infringement to Civil Liberties or Human
Rights
What are specific internet issues on
internet policy that have relationship to civil
liberties or human rights? Let’s study the
examples that follow.
Issue No.1: FREEDOM OF EXPRESSION AND
CENSORSHIP
Under international human rights conventions,
all people are guaranteed the rights for free
expression. However, with the shift from
communicating and on-line networking, a need to
look into how these new means modifies the
understanding of freedom of expression and
censorship.
Issue No.1: FREEDOM OF EXPRESSION AND
CENSORSHIP
The UN Universal Declaration of Human
Rights provides that everyone has the right to
freedom of thought, conscience and religion,
likewise the right to freedom of opinion and
expression. However, there are practices that
violate these provisions in the use or internet.
Example 1
Individual rights are given up in
order to have access to electronic
networks.
Microsoft Network (MSN) reserves
the rights, in its sole discretion, to
terminate access to any or all MSN sites
or services.
Example 2
Censorship restricts the
transmission of information by blocking
it or filtering the information.
Blocking is preventing access to
whole areas of internet based on the
“blacklist” of certain Internet address,
location or email addresses.
Filtering is sifting the packets of data
or messages as they move across
computer networks and eliminating
considered “undesirable” materials.
“When you are surfing the web, you
may think you are anonymous, but
there are various ways that information
about you or your activities can be
collected without your consent.”
Issue No. 2: PRIVACY AND SECURITY
Privacy policies are an issue. Most commercial
sites have a privacy policy. When someone uses a
site and clicks “I agree” button, it is as if you have
turned over private information to any authority
that may access it.
Issue No.3: SURVEILLANCE AND DATA
RETENTION
The use of electronic communications
has enhanced the development of indirect
surveillance. In Indirect surveillance,
there is no direct contact between the
agent and the subject of surveillance but
evidence of activities can be traced.
The new and powerful form of
indirect surveillance is dataveillance.
Dataveillance is the use of personal
information to monitor a person's
activities while Data retention is the
storage and use of information from
communication systems.
To prevent surveillance, methods in
working can be done to make
surveillance difficult. This is called
“counter surveillance” which uses
electronic devices to detect and
prevent surveillance. or "information
security" if it refers to computers and
electronic communication.
ISSUE No. 4: E-POLLUTANTS FROM E-WASTE
Large amount of e-waste is generated
by ICT. These are in particular, terminal
equipment used for computing (PC’s,
laptops), broadcasting (televisions ad
radioset), telephony (fixed and mobile
phones) and peripherals (fax machines,
printers and scanners).
Remedies include standardization and
regulatory measures to increase the life
cycle of equipment before they become
obsolete. Efficient extraction of toxic
components and requiring the recycling by
both consumers and equipment vendors are
selling must be required.
If not controlled then, e-waste will
tremendously affect climate change,
damage human lives and overload the
capacity of the earth in carrying solid
waste.
What is e-waste?
•Includes computers, cell phones, and other
household appliances
•Can also include medical equipment, such as
microscopes and hot plates
•Can contain toxic substances like lead,
mercury, and cadmium
IMPLICATIONS TO TEACHING
AND LEARNING

How do the policy guidelines,


projects and issues relate to the
teaching and learning?
For the Teachers
and teaching
1. Guide the teachers on what
they should teach that relate to
ICT, and how to teach it. Since
ICT development comes so rapid
and fast, teachers might be
overwhelmed by its rapid speed.
Temperance in its use is a
caution that should be looked at.
2. Technology should never replace any
human teacher. The tools are support
instructional materials for the teachers
which are available for use. The teacher
should learn how to appropriately use
them. The human touch of the teacher is
still a vital component in teaching.
Teachers should always be reminded that
there are always limitations in the use of
the different gadget and tools.
3. There are rules and
regulations that govern the use of
technology. Caution should be
observed to protect individual
privacy. As teachers, you must be
aware that the use of technology
may jeopardize your privacy and
security.
4. All the issues and many more shall
be part of the teaching content as each
teacher will be encouraged to use
technology in teaching.
For the Learners
and Learning
Learners should not only know
the benefits of technology use, but
they should also know how they
can be protected from the hazards
that technology brings to their
lives.
Learners should take advantage
of the potential of learning support
they can derive such as the
development of higher order thinking
skills, the development of learning
communities through collaboration,
the enhancement of skills to manage
the vast resources as 21st learners .
l e s s o n

SAFETY ISSUES ON THE USE OF


ICT INCLUDING E-SAFETY
RULES
Some risks in the use of ICT and e-
Networking:

1. Exposure to inappropriate content,


including online pornography, extremism
(exposure to violence associated with
racist language).
2. Lifestyle websites like self-harm and
suicide sites, and hate sites.
Some risks in the use of ICT and e-
Networking:

3. Cyberbullying in all forms, receiving


sexually explicit images or messages.
4. Privacy issues including disclosure of
personal information.
5. Health and well-being (amount of time
spent online, internet gaming).
Some risks in the use of ICT and e-
Networking:

6. Prolonged exposure to online


technologies, particularly at an early age.
7. Addiction to gambling and gaming.
8. Theft and fraud from activities such as
phishing.
Some risks in the use of ICT and e-
Networking:
8. Theft and fraud from activities such as
phishing.
9. Viruses, Trojans, spyware and other
malware.
10. Social pressure to maintain online
networks via texting and social networking
sites.
MINOR MISUSE OF ICT
In school, some minor misuse made
by learners include the following:
1. Copying information into assignment
and failing to acknowledge the source
(plagiarism and copyright
infringement).
2. Downloading materials not relevant
to their studies.
MINOR MISUSE OF ICT
3. Misconduct associated with subject
logins, such as using someone else's
password.
4. Leaving a mobile phone turned on
during class period.
5. Unauthorized taking of pictures or
images with mobile phone camera, still
or moving.
E-SAFETY
E-safety takes care not only of internet
technologies but also of electronic communications
via mobile phones, games consoles and wireless
technology. It highlights the need to educate
children and young people about the benefits, risks
and responsibilities of using information
technology.
ISSUES OF E-SAFETY
1. e-safety helps safeguard children and
young people in the digital world
2. e-safety emphasizes learning to
understand and new technologies in a
positive way.
3. e-safety educates children about the
risks as well as the benefits so we can
feel confident online
4. e-safety supports young learners and
adults to develop safer online behaviors,
both in and out of school.
NETWORK MANAGEMENT
1. Safety in the use of Network in Schools
1.1. Make clear that no one should log on as
another user.
1.2. Require all users to always log off when
they have finished working.
1.3 Maintain equipment to ensure health and
safety.
1.4. Provide students with access to content and
resources through guided e-learning.
NETWORK MANAGEMENT
1.5. Set up a clear disaster recovery system
in place for critical data that include secure,
remote back up of critical data.
1.6. Secure wireless network to appropriate
standards suitable for educational use.
1.7. Install all computer equipment
professionally and meet health and safety
standards.
1.8. Review the school ICT system regularly
with regard to health and safety and
security.
2. Password Policy
2.1. Only authorized users will have
individual passwords. Users are not
permitted to disclose their passwords unless
they got permission from the owner or from
the management. The equipment that keeps
the personal information shall be locked
when unattended to prevent unauthorized
access.
Computers should be set to a time out if they
become unused for a certain period of time.
3. Personal mobile phones and
mobile devices
3.1. All mobile phones shall be kept
away in a box away from the children
or learners and access is only allowed
at break time or at the end of classes
or when needed during the class
period.
4. Cameras.
4.1. Taking pictures only from parents
or caregivers and not from any other
family member or friend while the child
attends class.
4.2. Any picture taken of children shall
be on cameras solely for the purpose.
SETTING UP AN EDUCATIONAL
TECHNOLOGY ROOM
1. Provide tiltable tables. These tables can be
tilted and adjusted to the height of the users.
2. Provide anti-glare screen filters.
3. Provide adjustable chairs.
4. Provide foot support.
5. Make sure lighting is suitable.
6. Make sure work stations are not cramped.
7. Plan work at a computer so that there are
frequent breaks.
Safety Rules that can reduce risk of
accidents in the working stations should
include:
1. No trailing wires across or around the
room which people can trip on.
2. Electrical sockets should not be overload.
3. Electrical equipment should be safety-
tested at least once a year.
4. There should be adequate space around
desk for people to move.
Safety Rules that can reduce risk of accidents in
the working stations should include:
5. Bags and obstacles should be stored out of the
way.
6. Food and drinks should not be placed near
machines.
7. Heating and ventilation should be suitable for
the working environment.
8. Fire extinguishers should be available.
9. Fire exits should be clearly marked and free
from clutter.

You might also like