Ict Policies and Issues Implications To Teaching and Learning
Ict Policies and Issues Implications To Teaching and Learning
ISSUES:
IMPLICATIONS TO
TEACHING AND
LEARNING CHAPTER
II
USES OF ICT POLICIES IN THE
TEACHING AND LEARNING
ENVIRONMENT
LESSON 1
INTRODUCTION
Globalization is reality and ICT has become a fundamental part
of the process. A network society is one in which the entire
planet is organized around telecommunicated networks of
computers. The powerful use of network has broken boundaries,
provided opportunities for inclusion and collaboration. However,
there will be a struggle for those who do not have the access or
those who are excluded, marginalized and powerless. Thus a
need to establish policies, in the use of ICT imperative.
As the Department of Information,
Communication and Technology (DICT)
says:
“The future has arrived. Now we
have to ensure that we have a
place in it.”
DEFINITION OF ICT POLICY
1. INFORMATION TECHNOLOGY
– includes the use of computers, which has become indispensable in
modern societies to process data and save time and effort. What are
needed will be computer hardware and peripherals, software and for the
user, computer literacy.
2. TELECOMMUNICATION TECHNOLOGIES
– include telephones (with fax) and the broadcasting of radio and
television often through satellites. Telephone system, radio and TV
broadcasting are needed in this category.
3. NETWORKING TECHNOLOGIES
– The best known of networking technologies is internet, but has
extended to mobile phone technology, Voice Over Internet Protocol
(VOIP) satellite communications and other forms of communications are
still in their infancy.
THE DICT ROADMAP
In our country, the Department of Information and
Communication Technology (DICT) has formulated a
roadmap to guide all agencies in the utilization regulation and
enhancement of ICT. Each project has corresponding policy
statements and guidelines.
The ICT for Education (ICT4E) is a program under the
DICT that supports all the efforts of the education sector in
incorporating the use of ICT as well as in determining and
gaining access to the infrastructure (hardware, software,
telecommunications facilities and others) which are necessary
to use and deploy learning technologies at all levels of
education.
Among the policy recommended programs that have
applications to education teaching-learning are:
1. ICT in education Masterplan for all levels, including a National Roadmap for faculty
Development in ICT in Education. A National Framework Plan for ICTs in Basic
Education was developed.
2. Content and application development through the Open Content in Education
Initiative (OCEI) which converts DepEd materials into interactive multi-media content,
develop applications used in schools, and conduct students and teachers’
competitions to promote the development of education-related web content.
3. PhedNET is a “walled” garden that hosts educational learning and teaching materials
and applications for use by the Filipino students, their parents and teachers. All public
high schools will be part of this network with only DepEd-approved multi-media
applications, materials and mirrored internet sites accessible from school’s PCs.
4. Established Community eLearning Centers called eskwela for out-of-school youth
(OSY) providing them with ICT-enhanced alternative education opportunities.
Among the policy recommended programs that have
applications to education teaching-learning are:
1. ICT in education Masterplan for all levels, including a National Roadmap for faculty Development in ICT in Education. A National Framework Plan for ICTs in Basic Education was developed.
2. Content and application development through the Open Content in Education Initiative (OCEI) which converts DepEd materials into interactive multi-media content, develop applications used in schools, and conduct students and teachers’ competitions to promote the development of education-related web content.
3. PhedNET is a “walled” garden that hosts educational learning and teaching materials and applications for use by the Filipino students, their parents and teachers. All public high schools will be part of this network with only DepEd-approved multi-media applications, materials and mirrored internet sites accessible from school’s PCs.
4. Established Community eLearning Centers called eskwela for out-of-school youth (OSY) providing them with ICT-enhanced alternative education opportunities.
5. eQuality Program for Tertiary education through partnerships with state universities and
colleges (SUCs) to improve quality of IT education and the use of ICT in education in the
country, particularly outside of Metro Manila.
6. Digital Media Arts Program which builds digital media skills for government using Open
Source technologies. Particular beneficiary agencies include the Philippine Information
Agency and the other government media organizations, the Cultural Center of the
Philippines, National Commission for Culture and Arts and other government art
agencies, State Universities and Colleges and other local government units.
7. ICT skills strategic plan which develops an inter-agency approach to identifying strategic
and policy and program recommendations to address ICT skills demand-supply type.
All the seven programs were guided by the
roadmap that embeds policy statements that relate
to education specifically in the enhancement of
human development for teaching and learning.
INFORMATION AND COMMUNICATIONS TECHNOLOGY
(ICT)
Information and Communications Technology (ICT) can impact student
learning when teachers are digitally literate and understand how to
integrate it into curriculum.
Schools use a diverse set of ICT tools to communicate, create, disseminate,
store, and manage information.
In some contexts, ICT has also become integral to the teaching-learning
interaction, through such approaches as replacing chalkboards with
interactive digital whiteboards, using students’ own smartphones or other
devices for learning during class time, and the “flipped classroom” model
where students watch lectures at home on the computer and use
classroom time for more interactive exercises.
INFORMATION AND COMMUNICATIONS TECHNOLOGY
(ICT)
When teachers are digitally literate and trained to use ICT, these
approaches can lead to higher order thinking skills, provide creative
and individualized options for students to express their
understandings, and leave students better prepared to deal with
ongoing technological change in society and the workplace.
ICT issues planners must consider include:
considering the total cost-benefit equation,
supplying and maintaining the requisite infrastructure,
and ensuring investments are matched with teacher support and
other policies aimed at effective ICT use.
SAFETY ISSUES ON THE
USE OF ICT
LESSON 2
INTRODUCTION
Technology is a phenomenon that seems to be
uncontrollable. Despite the so many benefits for teaching and
learning, there are also negative effects or influence on the
learners. Hence as future teachers you have to be aware of
how to safeguard learners in the school communities where
they spend most of their waking hours and also in their
homes of facilities that provide opportunities to use digital
technologies like Internet cafes. Safeguard and protection
should be the primordial role of parents, teachers and schools.
There are so many risks that we have to be aware of in the use
of digital technologies. (Bilbao, et.al.)
RISKS IN THE USE OF ICT
1. Exposure to inappropriate content, including on-line pornography,
extremism (exposure to violence associated with racist language);
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyber-bullying in all forms, receiving sexually explicit images or messages;
4. Privacy issues including disclosure of personal information;
5. Health and well-being (amount of time spent on-line, internet gaming and
many more;
6. Prolonged exposure to on-line technologies, particularly at an early age;
7. Addiction to gambling and gaming;
8. Theft and fraud from activities such as phishing;
9. Viruses, Trojans, spyware and other malware ; and
10. Social pressure to maintain online network via texting and social
networking sites.
TECHNOLOGY
SAFETY QUICK Safety Strategies
TIPS
When you first get a new computer or phone, increase
security by enabling firewalls for your computer, network or
phone (see settings) and install or run anti-spyware and anti-
Spyware: Computer & virus software; set your computer or device to automatically
install updates.
Phone Monitoring Software
Don’t open any attachments if you don’t know the sender, or
Description/Risks
you suspect abuse. Instead delete the attachment or have IT
It enables a person to secretly monitor
staff look at it.
someone else’s entire computer activity.
Trust your instincts. If someone knows too much about your
It can be installed remotely by sending an
computer activity, your computer may be monitored. Use a
email, photo, or instant message.
“safer” computer (one the abuser does not have any access to)
It runs hidden on a computer. It is very difficult
for private communications and web browsing.
to detect and almost impossible to remove.
Consider changing passwords and creating new accounts on
Some secretly reinstall if removed.
another computer. Do not access those accounts or use those
It can record and send screenshots (pictures passwords on the monitored computer.
of what’s on the screen), all keystrokes typed,
web sites visited, emails sent, instant
messages (IM), accounts accessed, passwords
typed, and more.
TECHNOLOGY
SAFETY QUICK
TIPS Safety Strategies
Has someone fiddled with, fixed, or given you a new
Keystroke Logging part for your computer?
Hardware Look for a small piece that connects the keyboard cord
Description/Risks to the computer; it can also be part of an external
It provides a record of all keystrokes typed on keyboard, or something installed inside a laptop.
a keyboard. Change passwords on accounts from another
Someone needs physical access to the computer and do not access those accounts from the
computer to install and later retrieve the compromised computer. With some services, you can
device with the data log of all your ask to get an alert (e.g. fraud alert) if your password
keystrokes. gets changed or your account gets changed.
An abuser may use it to see the passwords
you type and then be able to access your
email, credit card, or bank accounts, etc.
TECHNOLOGY
SAFETY QUICK
TIPS Safety Strategies
Global Positioning System (GPS) Trust your instincts. If someone seems to know too
Devices much or show up in random places, check for hidden
Description/Risks GPS devices or other location tracking services.
They are small, easily hidden, and affordable Consider notifying law enforcement.
devices that provide the ability to monitor A device can be hidden in your belongings or vehicle.
someone’s location. Check the trunk, under the hood, inside the bumper
Many cell phones also have GPS devices.
and seats. A mechanic or law enforcement can also do
They might be used to track your location
a search.
real-time (as you move) and to map your
Safety plan around/before removal of any location
location history.
Depending upon the service or application
tracking device, as it may alert the abuser
used to access GPS data, the stalker may be
able to secretly monitor your location via
websites or sometimes via their phone. Some
devices must be physically retrieved for the
abuser to review your location data.
TECHNOLOGY
SAFETY QUICK Safety Strategies
TIPS
For additional privacy and safety, consider getting a separate
donated phone from a shelter or purchasing a new phone (e.g. a pay-
as-you-go phone).
Mobile Phones Mechanics or law enforcement can check the vehicle to determine if
Description/Risks a phone has been hidden somewhere.
Phones can be a lifeline for victims. Contact carrier to add a password or code to account to protect from
Phones can be hidden inside vehicles as listening wrongful access.
devices by using the “silent mode” and “auto answer” You can change the phone’s location setting to “E911 only” or “911
features. only” so that the phone company only access your GPS if you dial 911.
Most phones have GPS chips and location tracking Also check if your phone has any applications installed that
abilities, which can be used to determine someone’s separately ask to access and use your real-time location, such as for
location. Some abusers install additional applications on mapping directions.
a cell phone to track your application. Settings such as “show all/hidden applications” might unveil some
Logs showing phone usage may be monitored on the
hidden applications.
actual phone or over the Internet via the phone
Consider turning off or uninstalling these applications.
company’s online billing record.
Use phone settings to change your default Bluetooth password, set
Joint phone plans with an abuser may give that person
Bluetooth to hidden, and turn Bluetooth off.
access to phone features and calling log information.
If your phone has a Bluetooth device, the stalker might Always give location information to 911 in an emergency.
try to connect with your phone using the Bluetooth to
access information on your phone or intercept your
communications.
TECHNOLOGY
SAFETY QUICK Safety Strategies
Personal Information & the Internet Do searches on yourself to see what information is
available.
Description/Risks
Be cautious and creative when providing personal
All kinds of public and private organizations,
information: only provide information that you feel is
agencies, services, and businesses collect and
share information about people. These can critical and safe for things like store discount cards.
include government and nongovernmental Ask schools, employers, courts and government services
organizations, community groups, schools and about Internet publications. Request that your
online sites such as social networking, gaming or information and photos not be posted in public
job sites. Search engines index the web and directories or online. In court systems, ask up front how
create virtual card catalogs. Some search deep your court records can be sealed and not posted online
into online databases and compile extensive
for safety reasons.
profiles on people.
Identifying information may be online without
If you have a restraining order, providing that can
victims’ knowledge. expedite these requests.
Stalkers use the Internet to find information about
the victim including the location and contact
information of victim. They also use online spaces
to defame, target and damage the reputation of
the victim.
Implications to Teaching and Learning