100% found this document useful (1 vote)
282 views27 pages

Ict Policies and Issues Implications To Teaching and Learning

router. Consider using antivirus and anti-malware software. The document discusses ICT policies and their implications for teaching and learning. It defines ICT policy and outlines the new ICT technologies of information technology, telecommunications, and networking. It then summarizes the ICT roadmap of the Department of ICT in the Philippines, which provides policy guidance and recommendations for programs in education including developing ICT skills, online educational content and applications, and establishing eLearning centers. The document also discusses using ICT in the classroom to enhance learning, as well as safety issues concerning inappropriate content, cyberbullying, privacy, and health risks when using ICT.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
282 views27 pages

Ict Policies and Issues Implications To Teaching and Learning

router. Consider using antivirus and anti-malware software. The document discusses ICT policies and their implications for teaching and learning. It defines ICT policy and outlines the new ICT technologies of information technology, telecommunications, and networking. It then summarizes the ICT roadmap of the Department of ICT in the Philippines, which provides policy guidance and recommendations for programs in education including developing ICT skills, online educational content and applications, and establishing eLearning centers. The document also discusses using ICT in the classroom to enhance learning, as well as safety issues concerning inappropriate content, cyberbullying, privacy, and health risks when using ICT.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

ICT POLICIES AND

ISSUES:
IMPLICATIONS TO
TEACHING AND
LEARNING CHAPTER
II
USES OF ICT POLICIES IN THE
TEACHING AND LEARNING
ENVIRONMENT
LESSON 1
INTRODUCTION
Globalization is reality and ICT has become a fundamental part
of the process. A network society is one in which the entire
planet is organized around telecommunicated networks of
computers. The powerful use of network has broken boundaries,
provided opportunities for inclusion and collaboration. However,
there will be a struggle for those who do not have the access or
those who are excluded, marginalized and powerless. Thus a
need to establish policies, in the use of ICT imperative.
As the Department of Information,
Communication and Technology (DICT)
says:
“The future has arrived. Now we
have to ensure that we have a
place in it.”
DEFINITION OF ICT POLICY

The Oxford English Dictionary has defined “policy” as a


course of action, adopted and pursued by a
government, party, ruler, statesman.

It is any course of action adopted as expedient or


advantageous.

Its operational definition of policy is a plan of action to


guide decisions and outcomes.
THE NEW ICT TECHNOLOGIES:
More recent technological innovations increased the teach and
speed of communications which can be grouped into three categories:

1. INFORMATION TECHNOLOGY
– includes the use of computers, which has become indispensable in
modern societies to process data and save time and effort. What are
needed will be computer hardware and peripherals, software and for the
user, computer literacy.
2. TELECOMMUNICATION TECHNOLOGIES
– include telephones (with fax) and the broadcasting of radio and
television often through satellites. Telephone system, radio and TV
broadcasting are needed in this category.

3. NETWORKING TECHNOLOGIES
– The best known of networking technologies is internet, but has
extended to mobile phone technology, Voice Over Internet Protocol
(VOIP) satellite communications and other forms of communications are
still in their infancy.
THE DICT ROADMAP
In our country, the Department of Information and
Communication Technology (DICT) has formulated a
roadmap to guide all agencies in the utilization regulation and
enhancement of ICT. Each project has corresponding policy
statements and guidelines.
The ICT for Education (ICT4E) is a program under the
DICT that supports all the efforts of the education sector in
incorporating the use of ICT as well as in determining and
gaining access to the infrastructure (hardware, software,
telecommunications facilities and others) which are necessary
to use and deploy learning technologies at all levels of
education.
Among the policy recommended programs that have
applications to education teaching-learning are:

1. ICT in education Masterplan for all levels, including a National Roadmap for faculty
Development in ICT in Education. A National Framework Plan for ICTs in Basic
Education was developed.
2. Content and application development through the Open Content in Education
Initiative (OCEI) which converts DepEd materials into interactive multi-media content,
develop applications used in schools, and conduct students and teachers’
competitions to promote the development of education-related web content.
3. PhedNET is a “walled” garden that hosts educational learning and teaching materials
and applications for use by the Filipino students, their parents and teachers. All public
high schools will be part of this network with only DepEd-approved multi-media
applications, materials and mirrored internet sites accessible from school’s PCs.
4. Established Community eLearning Centers called eskwela for out-of-school youth
(OSY) providing them with ICT-enhanced alternative education opportunities.
Among the policy recommended programs that have
applications to education teaching-learning are:

1. ICT in education Masterplan for all levels, including a National Roadmap for faculty Development in ICT in Education. A National Framework Plan for ICTs in Basic Education was developed.
2. Content and application development through the Open Content in Education Initiative (OCEI) which converts DepEd materials into interactive multi-media content, develop applications used in schools, and conduct students and teachers’ competitions to promote the development of education-related web content.
3. PhedNET is a “walled” garden that hosts educational learning and teaching materials and applications for use by the Filipino students, their parents and teachers. All public high schools will be part of this network with only DepEd-approved multi-media applications, materials and mirrored internet sites accessible from school’s PCs.

4. Established Community eLearning Centers called eskwela for out-of-school youth (OSY) providing them with ICT-enhanced alternative education opportunities.

5. eQuality Program for Tertiary education through partnerships with state universities and
colleges (SUCs) to improve quality of IT education and the use of ICT in education in the
country, particularly outside of Metro Manila.
6. Digital Media Arts Program which builds digital media skills for government using Open
Source technologies. Particular beneficiary agencies include the Philippine Information
Agency and the other government media organizations, the Cultural Center of the
Philippines, National Commission for Culture and Arts and other government art
agencies, State Universities and Colleges and other local government units.
7. ICT skills strategic plan which develops an inter-agency approach to identifying strategic
and policy and program recommendations to address ICT skills demand-supply type.
All the seven programs were guided by the
roadmap that embeds policy statements that relate
to education specifically in the enhancement of
human development for teaching and learning.
INFORMATION AND COMMUNICATIONS TECHNOLOGY
(ICT)
Information and Communications Technology (ICT) can impact student
learning when teachers are digitally literate and understand how to
integrate it into curriculum.
Schools use a diverse set of ICT tools to communicate, create, disseminate,
store, and manage information.
In some contexts, ICT has also become integral to the teaching-learning
interaction, through such approaches as replacing chalkboards with
interactive digital whiteboards, using students’ own smartphones or other
devices for learning during class time, and the “flipped classroom” model
where students watch lectures at home on the computer and use
classroom time for more interactive exercises.
INFORMATION AND COMMUNICATIONS TECHNOLOGY
(ICT)

When teachers are digitally literate and trained to use ICT, these
approaches can lead to higher order thinking skills, provide creative
and individualized options for students to express their
understandings, and leave students better prepared to deal with
ongoing technological change in society and the workplace.
ICT issues planners must consider include:
considering the total cost-benefit equation,
supplying and maintaining the requisite infrastructure,
and ensuring investments are matched with teacher support and
other policies aimed at effective ICT use.
SAFETY ISSUES ON THE
USE OF ICT
LESSON 2
INTRODUCTION
Technology is a phenomenon that seems to be
uncontrollable. Despite the so many benefits for teaching and
learning, there are also negative effects or influence on the
learners. Hence as future teachers you have to be aware of
how to safeguard learners in the school communities where
they spend most of their waking hours and also in their
homes of facilities that provide opportunities to use digital
technologies like Internet cafes. Safeguard and protection
should be the primordial role of parents, teachers and schools.
There are so many risks that we have to be aware of in the use
of digital technologies. (Bilbao, et.al.)
RISKS IN THE USE OF ICT
1. Exposure to inappropriate content, including on-line pornography,
extremism (exposure to violence associated with racist language);
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyber-bullying in all forms, receiving sexually explicit images or messages;
4. Privacy issues including disclosure of personal information;
5. Health and well-being (amount of time spent on-line, internet gaming and
many more;
6. Prolonged exposure to on-line technologies, particularly at an early age;
7. Addiction to gambling and gaming;
8. Theft and fraud from activities such as phishing;
9. Viruses, Trojans, spyware and other malware ; and
10. Social pressure to maintain online network via texting and social
networking sites.
TECHNOLOGY
SAFETY QUICK Safety Strategies

TIPS
When you first get a new computer or phone, increase
security by enabling firewalls for your computer, network or
phone (see settings) and install or run anti-spyware and anti-
Spyware: Computer & virus software; set your computer or device to automatically
install updates.
Phone Monitoring Software
Don’t open any attachments if you don’t know the sender, or
Description/Risks
you suspect abuse. Instead delete the attachment or have IT
It enables a person to secretly monitor
staff look at it.
someone else’s entire computer activity.
Trust your instincts. If someone knows too much about your
It can be installed remotely by sending an
computer activity, your computer may be monitored. Use a
email, photo, or instant message.
“safer” computer (one the abuser does not have any access to)
It runs hidden on a computer. It is very difficult
for private communications and web browsing.
to detect and almost impossible to remove.
Consider changing passwords and creating new accounts on
Some secretly reinstall if removed.
another computer. Do not access those accounts or use those
It can record and send screenshots (pictures passwords on the monitored computer.
of what’s on the screen), all keystrokes typed,
web sites visited, emails sent, instant
messages (IM), accounts accessed, passwords
typed, and more.
TECHNOLOGY
SAFETY QUICK
TIPS Safety Strategies
Has someone fiddled with, fixed, or given you a new
Keystroke Logging part for your computer?
Hardware Look for a small piece that connects the keyboard cord
Description/Risks to the computer; it can also be part of an external
It provides a record of all keystrokes typed on keyboard, or something installed inside a laptop.
a keyboard. Change passwords on accounts from another
Someone needs physical access to the computer and do not access those accounts from the
computer to install and later retrieve the compromised computer. With some services, you can
device with the data log of all your ask to get an alert (e.g. fraud alert) if your password
keystrokes. gets changed or your account gets changed.
An abuser may use it to see the passwords
you type and then be able to access your
email, credit card, or bank accounts, etc.
TECHNOLOGY
SAFETY QUICK
TIPS Safety Strategies

Global Positioning System (GPS) Trust your instincts. If someone seems to know too
Devices much or show up in random places, check for hidden
Description/Risks GPS devices or other location tracking services.
They are small, easily hidden, and affordable Consider notifying law enforcement.
devices that provide the ability to monitor A device can be hidden in your belongings or vehicle.
someone’s location. Check the trunk, under the hood, inside the bumper
Many cell phones also have GPS devices.
and seats. A mechanic or law enforcement can also do
They might be used to track your location
a search.
real-time (as you move) and to map your
Safety plan around/before removal of any location
location history.
Depending upon the service or application
tracking device, as it may alert the abuser
used to access GPS data, the stalker may be
able to secretly monitor your location via
websites or sometimes via their phone. Some
devices must be physically retrieved for the
abuser to review your location data.
TECHNOLOGY
SAFETY QUICK Safety Strategies

TIPS
For additional privacy and safety, consider getting a separate
donated phone from a shelter or purchasing a new phone (e.g. a pay-
as-you-go phone).
Mobile Phones Mechanics or law enforcement can check the vehicle to determine if
Description/Risks a phone has been hidden somewhere.
Phones can be a lifeline for victims. Contact carrier to add a password or code to account to protect from
Phones can be hidden inside vehicles as listening wrongful access.
devices by using the “silent mode” and “auto answer” You can change the phone’s location setting to “E911 only” or “911
features. only” so that the phone company only access your GPS if you dial 911.
Most phones have GPS chips and location tracking Also check if your phone has any applications installed that
abilities, which can be used to determine someone’s separately ask to access and use your real-time location, such as for
location. Some abusers install additional applications on mapping directions.
a cell phone to track your application. Settings such as “show all/hidden applications” might unveil some
Logs showing phone usage may be monitored on the
hidden applications.
actual phone or over the Internet via the phone
Consider turning off or uninstalling these applications.
company’s online billing record.
Use phone settings to change your default Bluetooth password, set
Joint phone plans with an abuser may give that person
Bluetooth to hidden, and turn Bluetooth off.
access to phone features and calling log information.
If your phone has a Bluetooth device, the stalker might Always give location information to 911 in an emergency.
try to connect with your phone using the Bluetooth to
access information on your phone or intercept your
communications.
TECHNOLOGY
SAFETY QUICK Safety Strategies

TIPS Avoid using email for sensitive or personal information.


If you think your email is being monitored, consider creating an
additional new email account on a safer computer. Never access
Email the new accounts on a monitored computer (see above).
Description/Risks When setting up a new email account, don’t use any identifying
information.
It is like a postcard and is not a private form Avoid passwords that others can guess.
If you receive threats by email, save the electronic copies. Keep
of communication.
the emails in the system, but also consider forwarding a copy to
Can be monitored and intercepted in a
another email account.
variety of ways, many times without your
You can also print copies of the email; see if the print version can
knowledge. display the full email header.
Stalkers can intercept and monitor email Consider reporting email threats or hacked accounts to law
using spyware or by getting your password; enforcement.
they might change your email settings so These are crimes and the police can use email header information
they can get secretly forwarded or secretly to help trace emails to the original sender
copied (designated as bcc) on every email
you send or receive from that account.
TECHNOLOGY
SAFETY QUICK
TIPS Safety Strategies
Hidden Cameras
Description/Risks Trust instincts. If abuser knows something that
can only be seen, a camera may be being used.
Affordable, accessible, and easy to install, Camera detectors can help to find wireless
cameras come hidden in various items
cameras that are giving off a signal, but will not
(clocks, plants, etc.).
Can be wired into your house or transmit
detect a wired camera.
wirelessly. Law enforcement may help to search for hidden
Can be very difficult to detect. cameras.
Can create image files that include time, date
and location data.
Abuser can install camera surveillance and
monitor all your activity remotely over the
Internet.
TECHNOLOGY
SAFETY QUICK
TIPS Safety Strategies

Personal Information & the Internet Do searches on yourself to see what information is
available.
Description/Risks
Be cautious and creative when providing personal
All kinds of public and private organizations,
information: only provide information that you feel is
agencies, services, and businesses collect and
share information about people. These can critical and safe for things like store discount cards.
include government and nongovernmental Ask schools, employers, courts and government services
organizations, community groups, schools and about Internet publications. Request that your
online sites such as social networking, gaming or information and photos not be posted in public
job sites. Search engines index the web and directories or online. In court systems, ask up front how
create virtual card catalogs. Some search deep your court records can be sealed and not posted online
into online databases and compile extensive
for safety reasons.
profiles on people.
Identifying information may be online without
If you have a restraining order, providing that can
victims’ knowledge. expedite these requests.
Stalkers use the Internet to find information about
the victim including the location and contact
information of victim. They also use online spaces
to defame, target and damage the reputation of
the victim.
Implications to Teaching and Learning

There are great implications of this


lesson to both the teachers who are
teaching and the learners who are
learning. A few of these are as follows:
FOR THE TEACHERS AND TEACHING
Guide the teachers on what they should teach that relate to ICT, and
how to teach it. Since ICT development comes so rapid and fast,
teachers might be overwhelmed by its rapid speed. Temperance in its
use is a caution that should be looked at.
Technology should never replace any human teacher. The tools are
support instructional materials for the teachers which are available for
use. The teacher should learn how to appropriately use them. The
human touch of the teacher is still a vital component in teaching.
Teachers should always be reminded that there are always limitations in
the use of the different gadget and tools.
CONT...
There are rules and regulations that govern the use of technology.
Caution should be observed to protect individual privacy. As teachers,
you must be aware that the use of technology may jeopardize your
privacy and security.
All the issues and many more shall be part of the teaching content as
each teacher will be encouraged to use technology in teaching.
FOR THE LEARNERS AND LEARNING
The learners of the 21st Century are even more advanced than
some of the teachers. However, learners still need guidance on how to
use, regulate technology use. As there are positive and negative
effects of technology use, learners should know the difference.
Learners should not only know the benefits of technology use, but
they should also know how they can be protected from the hazards
that technology brings to their lives. Learners should take advantage
of the potential of learning support they can derive such as the
development of higher order thinking skills, the development of
learning communities through collaboration, the enhancement of skills
to manage the valid resources as 21st century learners and many
more. Both teachers and learners should be mindful of the e-waste
that are being thrown away to the land and to the atmosphere.

You might also like