You are on page 1of 11

Prof Ed 7

ICT Policies and Issues:


Implications to Teaching and
Learning

Introduction

Globalization is a reality and ICT has become a fundamental part of the process. A

networked society is one in which the entire planet is organized around telecommunicated

networks of computers.
According to Department of Information, Communication Technology (DICT) “The future has

arrived, now we have to ensure that we have a place in it”

Policies and issues on Internet and implications to


teaching and learning

Definition of ICT policy

It is any course of action adopted as expedient or advantageous.

ICT policies are needed to put a roadmap or course of actions to be pursued and adopted

by various governments, organizations, entities involving ICT.

The New ICT Technologies

1. Information Technology - Includes the use of companies, which has become

indispensable in modern societies of processing data and saving time and effort.

2. Telecommunication Technologies - Include telephones (with fax) and the

broadcasting of radio and television often through satellites.

3. Networking technologies - The best known of networking technologies is the

internet, this category also includes mobile telephone, cable, DSL, satellite and other

broadband connectivity.

The DICT Roadmap

The department of information and Communication Technology (DICT) has formulated a

roadmap to guide all agencies in the utilization, regulation and enhancement of ICT .The

ICT for education sector in incorporating the use of ICT as well in determining and gaining

access to the infrastructure (hardware,software,telecommunication facilities and others.

Among the policy recommended programs that have applicants of education teaching

learning are:

1.ICT in education master plan for all levels


2.Content and application development through the Open Content in Education initiative

(OCEI)

3. PheDNET

4.Establish Community learning Centers called eskwela for out of School youth (OSY)

5.Equality Program for tertiary education through partnership with state universities and

colleges (SUCS)

6.Digital Media Arts Program

7.ICt Skills strategic plan which develops an interest agency approach to identifying

strategic and policy and program recommendation to address ICT skills demand supply

type.

Some issues on ICT and Internet Policy and Regulation.

Global Issues

Access and civil liberties are two sets of issues ICT Policy which are crucial to the modern

society. The other concern is civil liberties which refer to human rights and freedom. Access

the use of Internet and Ict .Access means the possibility for everyone to use the Internet

and other media. In richer countries basic access to Internet almost available to all with

faster broadband connection. There are still countries where access to Internet is still a

challenge.

Issue No. 1: Freedom of Expression and Censorship


• Concerns have been expressed concerning the influence of electronic and online
networking on freedom of expression and censorship as a result of the move from
traditional communication methods to electronic and online networking.

• The United Nations Universal Declaration of Human Rights provides everyone the right to
freedom of thought, conscience, religion, and opinion, yet some internet behaviors
contradict these rights.

Some examples are the following:

1. Individual rights are given up in order to have access to electronic networks. Microsoft
Network (MSN) contracts protect individuals from uploading or making available files
containing protected intellectual property materials, unless they own or control the rights
or have consent. However, Microsoft can terminate access to MSN sites or services at its
discretion.

2. Censorship restricts information transmission by blocking or filtering it, based on a


blacklist of addresses or locations, and sifting packets to eliminate unwanted materials,
with site selection being a concern.

3. Defamation actions may be used to silence critics. This action deters the freedom of
expression.

Issue No. 2: Privacy and Security

• Privacy policies are an issue. Most commercial sites have a privacy policy. When someone
uses a site and clicks "I agree" button, it is as if you have turned over private information to
any authority that may access it.
There are several types of privacy as shown by the following examples:

1. For most, privacy means "personal privacy" the right of individuals not

to have their home, private life or personal life interfered with.

2. Privacy of communication is the protection from interference in phone or internet


communication, crucial for maintaining human relationships through technological
communication media.

3. Information privacy is crucial in the fast-paced processing of large-scale data, ensuring


its use only for its intended purpose and not disclosure without consent.

Issue No. 3: Surveillance and Data Retention

• Electronic communications have boosted indirect surveillance, enabling dataveillance, a


powerful form of surveillance that uses personal information to monitor activities, while
data retention involves the storage and use of communication system data.

• Counter surveillance or information security involves altering work methods to make


surveillance difficult, as there is limited prevention.

Issue No. 4: E-pollutants from E-waste


E-waste, generated by ICT equipment, is increasing in both developed and developing
countries. Rapid software improvements have led to rapid equipment turnover, causing
toxic waste. Remedies include standardization and regulatory measures to increase
equipment life cycles, efficient extraction of toxic components, and recycling. E-waste can
significantly impact climate change, human lives, and Earth's capacity for solid waste
transportation.

Implication the teachers and teaching

How do the policy guidelines, projects and issues related to the teaching and learning?

There are great implications of this lesson to both the teachers who are teaching and

learners who are learning. A few of these are as follow

For the teachers and teaching

1. Guide the teachers on what they should teach that is related to ICT, and how to

teach it. Since ICT development comes so rapidly, teachers might be overwhelmed

by its rapid speed. Temperance in its use is caution that should be looked at.

2. Technology should never replace any human teachers. The tools support

instructional materials for teachers which are available for use. The teacher should

learn how to appropriately use them. Human touch of the teacher is still a vital

component in teaching. Teachers should always be reminded that there are always

limitations in the use of different gadgets and tools.

3. There are rules and regulations that govern the use of technology. Caution should

be observed to protect individuals privacy. As teachers, you must be aware that the

use of technology may jeopardize your privacy and security.


4. All the issues and many more shall be part of the teaching content as each teacher

will be encouraged to use technology and teaching.

For the learners and learning

1. The learners of the 21st Century are even more advanced than more of the

teachers. However, learners still need guidance on how to use, regulate technology

use. As there are positive and negative effects of technology use, learners should

know that difference.

2. Learners should not only know the benefits to technology use, but they should also

know how they can be protected from the hazards that that technology brings to

their lives.

3. Learners should take advantage of the potential of learning support they can derive

such as the development of higher order thinking skill, the development of learning

communities through collaboration, the enhancement of skill to manage the vast

resources as 21st Century learners and many more.

4. Both the teachers and learners should be mindful of the e-waste that is being

thrown away to the land and to the atmosphere. Thus, safety in the use of

technology shall be presented in the next lesson.

Some Risk of the Use of ICT and e-Networking:

1.) Exposure to inappropriate content, including on-line pornography, extremism (exposure


to violence associated with racist language);

2.) Lifestyle websites like self-harms and suicide sites, and hate sites;

3.) Cyber-bullying in all forms, receiving sexually explicit images or messages;

4.) Privacy issues including disclosure of personal information;

5.) Health and wellbeing (amount of time spent on-line, internet gaming and many more;

6.) Prolonged exposure to on-line technologies, particularly at an early age;


7.) Addiction to gambling and gaming;

8.) Theft and fraud from activities such as phishing:

9.) Viruses, Trojans, spyware and other malware; and

10.) Social pressure to maintain online networks via texting and social networking sites.

Minor Misuse of ICT:

In school, some minor misuse made by learners include the following:

->Copying information into assignment and failing to acknowledge the source (plagiarism
and copyright infringement).

->Downloading materials not relevant to their studies.

->Misconduct associated with subject logins, such as using someone else's password.

->Leaving a mobile phone turned on during class period.

->Unauthorized king of pictures or images with mobile phone camera still or moving.

e-Safety

e-safety takes care not only of internet technologies but also of electronic communications
via mobile phones, games consoles and wireless technology. It highlights the need to
educate children and young people about the benefits, risks and responsibilities of using
information technology. Here are some issues of e-safety:

e-safety helps safeguard children and young people in the digital world;

e-safety emphasizes learning to understand and new technologies in a

positive way;
e-safety educates children about the risks as well as the benefits so we can feel confident
online; and e-safety supports young learners and adults to develop safer online behaviors,
both in and out of school.

Network Management

1. Safety in the Use of Network in Schools

1.1. Make clear that no one should log on as another user.

1.2. Require all users to always log off when they have finished working.

1.3. Maintain equipment to ensure health and safety.

1.4. Provide students with access to content and resources through guided e-learning.

1.5. Set up a clear disaster recovery system in place for critical data that include secure,
remote back

up of critical data.

1.6. Secure wireless network to appropriate standards suitable for educational use.

1.7. Install all computer equipment professionally and meet health and safety standards.

1.8. Review the school ICT system regularly with regard to health and safety and security.

2. Password Policy

2.1 Only authorized users will have individual passwords. 3. Personal mobile phones and
mobile devices

3.1 All mobile phones shall be kept away in a box away from the children or learners and
access is only allowed at break time or at the end of classes or when needed during the
class period.

4. Camera

4.2 Taking pictures only from parents or caregivers and not from any other family member
or friend while the child attends class.
4.2. Any picture taken of children shall be on cameras solely for the purpose.

SETTING UP AN EDUCATIONAL TECHNOLOGY ROOM

Schools that plan to dedicate a room where the students can access technologies for
learning should include the following basic safety rules:

1.) Provide tiltable tables. This can be tilted and adjusted to the height of the users.

2.) Provide anti-glare screen filters.

3.) Provide adjustable chairs.

4.) Provide foot support.

5.) Make sure lighting is suitable.

6.) Make sure workstations are not cramped.

7.) Plan work at a computer so that there are frequent breaks.

More specifically safety rules that can reduce risk of accidents in the working

stations should include:

1.) No trailing wires across or around the room which people can trip on.
2.) Electrical sockets should not be overload.

3.) Electrical equipment should be safety- tested at least once a year.

4.) There should be adequate space around desk for people to move.

5.) Bags and obstacles should be stored out of the way.

6.) Foods and drinks should not be placed near machine.

7.) Heating and ventilation should be suitable for the working environment.

8.) Fire extinguishers should be available.

9.) Fire exits should be clearly marked and free from clutter.

You might also like