Professional Documents
Culture Documents
Project Title:
Project Leader:
Project Rationale:
Information communication technologies empower and bridge the gap between teaching and learning
in higher education. The use of ICT in an educational institution is part of the digital revolution in a
knowledge economy. Thus, enclosed with the mandate, through Republic Act No. 4126 and the core
values of the University of Eastern Philippines (UEP), this project examines the UEP information system
resources and capabilities to effectively create an e-classroom that would facilitate quality teaching and
learning strategies. Furthermore, this project plans to employ the model of resource-based view that
would oversee the overall findings of the four studies which targets the assessment of UEP’s strengths
and addressing its weaknesses in order to contribute to the university’s competitive advantage and in
meeting its missions. This is an effort of combining and arranging the university’s ICT and non-ICT
resources to form a tailored e-classroom project.
The use of teaching and learning technologies in support of the school activities present new challenges
and opportunities to both the instructors and the students (Deebom and Zite 2016). Literatures show
that students are expecting changes in the content delivery and accessibility of instructions, for they
want to learn anytime, anywhere, and in a new form that is interactive, socially based, fully integrated,
and inexpensive way (Rockinson- Szapkiw et al. 2013). Thus, this project is in response to the demands
of 21st century students, leveraging the current and available ICT infrastructure available within the
university.
Output:
The major output of this project is the implementation of e-classroom in delivery of teaching and
learning in the College of Science with the following specific contents:
1. The level of preparedness of the faculty members and students on the integration of e-
classroom in the delivery of teaching and learning.
2. Repository of the teaching and learning materials of the faculty in the presentation and delivery
of topics.
3. Compilation of the inventory of ICT infrastructure in line with the delivery of e-classroom within
the university.
4. Recommended policies, practices, and procedures in teaching and learning instructions in the
university.
Study 1: CS Faculty Preparedness on E-Classroom
Study Leader:
Celeste J. Chan
Member:
Pert Kennesa P. Ambida/ Manuela Cecille V.
Ma. Lourdes C. Alvarez
Romula A. Obleopas
Christine V. Mollejon/ Mary Jane
6 months
Objective:
Determine the CS Faculty preparedness on the integration of e-classroom in teaching and learning
strategies, specifically
Methodology:
Mixed methods will be the research methodologies of study 1. Thus, the survey based method would be
the predominant approach because of its well-established characteristics, that if well implemented can
provide insights (Karanja & Zaveri, 2013). Table 1 shows the list of constructs, variables, type of
response, and rating scale of the questionnaire which are anchored from the framework of Access to
New Media of Van Dijk (2006). This framework will be the guide in drafting the set of questions. The
statistical techniques to be applied are descriptive statistics such as frequency count, percentage
distribution, ranking and weighted mean.
On the other hand, survey questionnaire will be supplemented with the qualitative interview which will
provide support to the quantitative results. The qualitative approach of this section is thematic analysis.
It identifies, analyzes, and reports pattern of themes within the data (Braun and Clarke 2006). It will
capture the important elements of the way the faculty members use ICT in preparation of instruction
and in teaching. The interviews with the participants will be conducted simultaneously with the survey.
Through the combined techniques of quantitative and qualitative, this would expect to generate a thick
description of the degree of preparedness of the CS faculty members on the implementation of e-
classroom in the delivery of instruction.
To express consent in performing the in-depth interview, participants will be requested to affix their
signatures to the consent form. It is believed that the conduct of the interviews is needed in order to
thoroughly explore the views of the CS faculty members, that is, hearing their voices through their
lesson planning, preparation, and teaching experiences. Allowing them to tell their stories in a more
detailed and clearer way than what will be stated in the questionnaire are vital parts of the activities of
this research. Building rapport with the participants will be the first thing that will be established. A
letter of request will be given to the participants in securing their permission to participate in the study.
The research framework of this study and the data collection protocol will be the requirements to begin
the proper interview approach (Turner 2010). The interview guide will ensure that particular areas of
information will be collected from each participant. The constructs of the four stages of Access to New
Media will guide the interview of the participants. The first procedure of the conduct of the interview
will be identification of the participant. They are the 45 faculty members of the College of Science.
Table 1: Four Stages of Access to New Media of the faculty members in the implementation of e-
classroom in the delivery of instruction
Research Framework:
Previous researchers call for change in the terminology of the digital divide to “e-inclusion”, which has
more positive implications (Almuwil et al. 2011). It is e-inclusion which is the solution to gaps in ICT
usage, improves the quality of life and social participation (Bannier et al. 2013). It was also termed
“digital inclusiveness” (Andreasson 2015), which is the participation of all individuals and communities in
all aspects of the information society (Bentivegna and Guerrieri 2010). Thus, in the context teaching and
learning in higher education, the use of information communication technologies would complement to
the traditional teaching strategies forming as part of blended-learning strategy which will empower the
faculty members and students and bridge the digital gap.
Similarly, Bradbrook and Fischer identified the e-inclusion in 5 “C’s” key issues, these are connection,
capability, content, confidence, and continuity (Almuwil et al. 2011), while van Dijk (2006) distinguishes
four successive kinds of new media access, which are motivational, material or physical, skills, and usage
access (see Figure 1). Similarly, James Pick and his colleague identified and examined four digital divide
theories and Van Dijk's concept is one of them which the possible outcome factor is focusing
participation in the society through the use of ICT while the outcome of other three theories are
adoption and diffusion of innovation, use behavior, and utilization of ICT (Pick 2016).
The first stage is the motivational access which is also referred as “first-level” or “first order digital
divide” (Friemel 2014). It is an access to the internet and it should be considered from a home and
community perspectives (Prioste 2013). In terms of adoption, access is mostly measured as a binary
variable such as have you used internet? or have you never used internet (Friemel 2014)? However, the
result of the unequal access to ICTs can be viewed in the imbalance participation of the individuals in the
society (van Dijk 2006).
The second kind of access to digital technology is material or physical access (van Dijk 2006). This is
similar to the access dimension of the European Index of Digital Inclusion. No digital inclusion process
can be implemented without this dimension because it comprises of the prerequisites for the
appropriation of ICTs or the conditions of physical access and quality (Bentivegna and Guerrieri 2010).
However, the most important resource enabling material or physical access are household income,
sufficient time to use the technology, social resources or a social network. These are engines in
accessing and using ICT that inspire and help the individual in a paticular household or region. The
positional characteristics are labor, education, household, and nation, while personal categories are age,
gender, intelligence, and health (Dijk 2006; Pick 2016).
The third kind of access to new media is the skill access, which is the second-level of digital divide of
Friemel (2014). It is the inequality of IT capability or ability to use the ICT which arises due to digital
access divide (Wei et al. 2011). Livingstone & Helsper, (2007) identified the needed skills to maximize
the benefits of internet use, these are measured in the frequency of use, time spent online, kinds of
uses, expertise in use, specific skills online, and attitudes towards internet use. While van Dijk (2006)
requires three types of digital skills, these are operational skills, skills to operate computer and network
hardware and software; information skills, abilities to search, select, and process information in
computer and network sources; and strategic skills, capacities to use ICT sources as the means for
specific goals and for the general goal of improving one’s position in society such as in social
relationships.
The fourth kind of access is the usage access. This is the ultimate aim of the appropriation of any new
technology and it indicates a continuous form of technology usage like the frequency of ICT use (van
Dijk, 2006) in teaching and learning activities.
(4th Stage)
Usage Access
(Different applications)
(3rd Stage)
Skills Access
– Strategic
– Informational
– Operational
Digital Skills
(2nd Stage)
(Computer / internet possession)
(1st Stage)
Motivational
Access
(Motivation of use)
Study Leader:
Jose P. Ching Jr.
Member:
Riva A. Gatongay
Fel Muncada
Marivic L. Doncillo
6 months
Objective:
Determine the UEP Students’ Adoption and Non-adoption of ICT in Learning, specifically
Methodology:
The research strategy of study 2 is mixed methods, a data gathering approach among students of the
university which includes survey method and in depth interviews. Descriptive statistics would be the
statistical technique of this study. On the other hand, a thematic analysis would be used as a
complementary procedure to provide additional insights of the findings derived from the quantitative
methodology about the use and non-use of the students on ICT. This part of research is anchored from
the diffusion of innovation theory (DOI). A theory that would describe on how, why, and what the extent
of the spread of ICT innovation in learning are adopted by the students in an organization such as the
university.
Work plan:
6 months
Objective:
Determine the preparedness of ICT Infrastructure of the University of Eastern Philippines in the
Implementation of e-classroom, specifically
1.1 Staff Capability
1.2 Network Infrastructure
1.3 Internet connectivity
1.3 Hardware and software
1.4 Learning materials such as:
1.4.1 Electronic learning materials
1.4.2 Electronic instructional materials
1.4.3 Electronic assessment technology
1.5 Factors affecting ICT implementation sustainability such as:
1.5.1 UEP/CS budgetary allotment for ICT Infrastructure
1.5.2 ICT Support earned from outside entity
Methodology:
One of the tasks in carrying out risk assessment in an organization for the management of their IT
infrastructure is the asset identification and valuation. An asset is something to which an organization
directly assigns value and therefore needs protection (Ramirez 2018). Specifically, in ICT context these
assets are information, software, physical, and services. Thus, this study will make use of the first
procedure of risk assessment methodology, the identification and valuation of assets. These are faculty
members, staff personnel, and ICT infrastructures that have direct connection with the delivery of
teaching and learning in the College of Science - UEP.
The first task of the asset identification and valuation would be the compilation of the inventory of
assets in line with the delivery of e-classroom within the university. After the compilation of the
inventory of teaching and learning assets, the next step is the classification of these assets into
information, paper/printed documents, software, physical or hardware, people, services, and company
image and reputation. The last procedure would be the identification and determination of the asset
value with the formula: confidentiality x integrity x availability = asset value. Confidentiality insure that
the information should be available only to authorized individuals, integrity means that the information
should be modified only by authorized individuals, while availability intends that information should be
accessible to those who are authorized to access it when they need it. These are the three aspect of
information security, through this procedures, this research work would identify the preservation of
confidentiality, integrity, and availability in ICT requirements of the university which are needed to
operate an e-classroom. Thus, would determine the preparedness of ICT Infrastructure of the university
in the implementation of e-classroom.
An in-depth interview will be conducted to respondents or participants namely, Office of the President
(Head), Office of the Vice-President for Administration (Head), Office of the Vice-President for Academic
Affairs (Head), Budget Office (Head), Supply and Property Office(Heads), Graduate and Undergraduate
(Dean and Department Chairmen), and Center for Computer Studies (Head and Staff), simultaneously
with the inventory of ICT infrastructure. To express consent in performing the in-depth interview,
participants will be requested to affix their signatures to the consent form. It is believed that the
conduct of the interviews is needed in order to thoroughly explore the participants’ views on the
implementation of e-classroom in the university, that is, hearing their opinions and suggestions.
Work plan:
Study 4: E-classroom System for the Delivery of Teaching and Learning in the University of Eastern
Philippines
Study Leader:
Maximo Resuello
Member:
Jose Ariel Geriane
Jose P. Ching Jr.
Celeste Chan
6 months
Objective:
Methodology:
In developing and utilizing the e-classroom system as teaching and learning approach, the study
will use the Rapid Application Development (RAD) as a system development methodology. This system
development process has four (4) phases that is parallel to system development life cycle (SDLC). The
phases of RAD are requirements planning, user design, construction, and cutover. This methodology
reduces cost and development time, compared to SDLC. It is flexible with the aid of tools and techniques
in describing data flow, processes, and storage (Gary B. Shelly and Harry J. Rosenblatt 2012).
Requirements planning
User design
In this phase, user needs will be transformed into working models. It is an interactive process
between the proponents and the recipients of the e-classroom system. It involves understanding on the
part of the user, modifying the prototype and eventually approval of the final model which has all the
needed requirements of the user for teaching and learning instructions.
Construction
Construction deals with e-classroom platform development. The participation of the concerned
individuals are highly needed for their suggestions and towards the improvement of the final output.
Cutover
Once the e-classroom system is deployed, a training should be conducted for a successful
turnover and management of the platform.
The assessment of the use of e-classroom system in teaching and learning instructions would be
through the lens of Technology Acceptance Model (TAM) (Chuttur 2009). The attitude of the user to use
the technology is influenced by the two factors, namely perceived usefulness and perceived ease of use.
Thus, the scale items of the two constructs are enumerated below. In the construct perceived
usefulness, the items are clustered based on the effectiveness of the work done, the productivity and
time saving of using the e-classroom system. While, the items of the construct perceived ease of use are
also grouped as physical effort, mental effort, and perception on how easy to learn the e-classroom
application.
Work plan:
Personal Services
ITEM 2019
Q1 Q2 Q3 Q4 TOTAL
a. Wages 2 Student 4,000.00 4,000.00 4,000.00 4,000.00 16,000.00
Assistants
(Encoder/Programmer)
@2,000/mo.
b. Honorarium 20,000.00 20,000.00
@5,000/study
TOTAL 4,000.00 4,000.00 4,000.00 24,000.00 36,000.00
References
Almuwil, A., Weerakkody, V., and El-Haddadeh, R. 2011. “A Conceptual Study of the factors Influencing
e-inclusion,” European, Mediterranean & Middle Eastern Conference on Information Systems 2011
(2011:2008), pp. 198–209.
Andreasson, K. 2015. Digital Divides: The New Challenges and Opportunities of e-Inclusion, Boca Raton,
Florida: CRC Press.
Bannier, S., Glott, R., and Meijs, V. 2013. “How E-Inclusion and Innovation Policy Affect Digital Access
and Use for Senior Citizens in Europe,” pp. 3–12.
Bentivegna, S., and Guerrieri, P. 2010. “A composite index to measure digital inclusion in Europe.,”
Braun, V., and Clarke, V. 2006. “Using thematic analysis in psychology,” Qualitative Research in
Psychology (3), pp. 77–101.
Chuttur, M. 2009. “Working Papers on Information Systems Overview of the Technology Acceptance
Model : Origins , Developments and Future Directions,” Sprouts: Working Papers on Information
Systems (9), pp. 9–37.
Deebom, T. M., and Zite, B. N. 2016. “Effectiveness of Information Communication Technology ( ICT ) in
Teaching and Learning in ...,” (2:July), pp. 18–26.
van Dijk, J. A. G. M. 2006. The Network Society Social Aspects of New Media (2nd Editio.), SAGE
Publications.
Friemel, T. N. 2014. “The digital divide has grown old: Determinants of a digital divide among seniors,”
New Media & Society, pp. 1–19 (doi: 10.1177/1461444814538648).
Gary B. Shelly, and Harry J. Rosenblatt. 2012. Systems Analysis and Design Course Technology, Cengage
Learning (9th Editio., Vol. 91), Boston, MA 02210 USA.
Livingstone, S., and Helsper, E. 2007. “Gradations in digital inclusion: children, young people and the
digital divide,” New Media & Society (9:4), pp. 671–696 (doi: 10.1177/1461444807080335).
Pick, J. 2016. “Theories of the Digital Divide : Critical Comparison,” (doi: 10.1109/HICSS.2016.484).
Prioste, C. D. 2013. “Barriers Concerning Digital Inclusion in one São Paulo Public School: What Have
Adolescents Been Learning on the Internet?,” International Journal of Technology and Inclusive
Education (2:1), pp. 116–123.
Ramirez, T. J. 2018. “Information Security Management System (ISO 27001) Implementation Training.,”
Rockinson- Szapkiw, A. J., Courduff, J., Carter, K., and Bennett, D. 2013. “Electronic versus traditional
print textbooks: A comparison study on the influence of university students’ learning,” Computers
and Education (63), Elsevier Ltd, pp. 259–266 (doi: 10.1016/j.compedu.2012.11.022).
Turner, D. W. 2010. “Qualitative interview design: A practical guide for novice investigators,” The
Qualitative Report (15:3), pp. 754–760 (doi: http://www.nova.edu/ssss/QR/QR15-3/qid.pdf).
Wei, K.-K., Teo, H.-H., Hock, C. C., and Tan, B. C. Y. 2011. “Conceptualizing and Testing a Social Cognitive
Model of the Digital Divide,” Information Systems Research (22:1), pp. 170–187 (doi:
10.1287/isre.1090.0273).