Uploaded by Punay, Adelfa

TTL-1 SPLP M2-Lesson-1

advertisement
Republic of the Philippine
SOUTHERN LEYTE STATE UNIVERSITY-TOMAS OPPUS CAMPUS
San Isidro, Tomas Oppus, Southern Leyte
Self-Paced Learning Plan (SPLP)
I.
Course Number & Descriptive Title
Educ 204 - Technology for Teaching and Learning 1
II.
Topic
Safety Issues on the Use of ICT including e-Safety Rules
III.
Objectives
 Identify and explain safety issues on the use of ICT
IV.
Content of the Lesson
As the Department of Information, Communication and Technology (DICT) says: “The
future has arrived. Now we have to ensure that we have a place in it.”
New technologies have become central to the lives of every individual in this planet.
Whether you are talking on the phone, sending an electronic mail, going to the bank, using the
library, watching news on television, going to the doctor, catching a flight, or seeing a movie,
you are using ICT. Almost everything that we do in the modern world is influenced by the new
technologies.
Would your life as a teacher be also influenced by the new technologies?
Some Issues on ICT and Internet Policy and Regulations
Global Issues
Access and Civil Liberties are two sets of issues in ICT Policy which are crucial to the
modern society. The other concern is civil liberties which refer to human rights and freedom.
These include freedom of expression, the right to privacy, the right to communicate and
intellectual property rights.
Access to the Use of Internet and ICT. Access means the possibility for everyone to use the
internet and other media. In richer countries, basic access to internet is almost available to all
with faster broadband connections. There are still countries where access to internet is still a
challenge.
Infringement to Civil Liberties or Human Rights. What are the specific internet issues on
internet policy that have relationship to civil liberties or human rights? Let’s study the examples
that follow.
Issue No. 1: Freedom of Expression and Censorship
Under international human rights conventions, all people are guaranteed the rights for
free expression. However, with the shift from communicating through letter, newspapers and
public meetings to electronic communications and on-line networking, a need to look into these
new means modifies the understanding of freedom of expression and censorship.
The UN Universal Declaration of Human Rights provides that everyone has the right to
freedom of thought, conscience and religion, likewise the right to freedom of opinion and
expression. However there are practices that violate these provisions in the use of internet.
Some examples are the following:
1. Individual rights are given up in order to have access to electronic networks.
Microsoft Network’s (MSN’s contracts provide protection of individuals like “upload,
or otherwise make available files that contain images, photographs or other materials
protected by intellectual property laws, including but not limiting to copyright or
trademark laws, unless you own or control the rights thereto or have received all
necessary consents to do the same.” However, Microsoft reserves the rights, in its sole
discretion, to terminate access of any MSN sites or services.
2. Censorship restricts the transmission of information by blocking it or filtering the
information. Blocking is preventing access to whole areas of internet based upon the
“blacklist”of certain Internet address, location or email addresses while filtering is
sifting the packets of date or messages as they move across computer networks and
eliminating those considered “undesirable” materials. The selection of sites that are
blocked or filtered has been considered as an issue.
3. Defamation actions may be used to silence critics. This action deters the freedom of
expression.
Warning!!!
“When you are surfing the web, you may think you are anonymous, but there are
various ways that information about you or your activities can be collected without
your consent.”
Issue No. 2: Privacy and Security
Privacy policies are an issue. Most commercial sites have a privacy policy. When someone
uses a site and clicks “I agree” button, it is as if you have turned over private information to any
authority that may access it.
There are several types of privacy as shown by the following examples:
1. For most, privacy means “personal privacy” the right of individuals not to have their
home, private life or personal life interfered with.
2. Privacy of communication refers to the protection from interference with
communication over the phone or internet. Respect for privacy of communications is
an essential prerequisite for the maintenance of human relationship via technological
communications media.
3. Information privacy is related to the use of computers and communications system
which are able to hold and process information about large numbers of people at a
high speed. It is important to ensure that information will only be used for purposes
for which it was gathered and will not be disclosed to others without consent of the
individuals.
Issue No. 3: Surveillance and Data Retention
The use of electronic communications has enhanced the development of indirect
surveillance. In the direct surveillance, there is no direct contact between the agent and the
subject of surveillance but evidence of activities can be traced. The new and powerful form of
indirect surveillance is dataveillance. Dataveillance is the use of personal information to monitor
a person’s activities while data retention is storage and use if information from communication
systems.
There is very little that can be done to prevent surveillance. What can be done is to change
the methods of working to make surveillance difficult. This is called “counter surveillance” or
“information security” if it refers to computers and electronic communication.
Issue No. 4: E-pollutants from E-waste
Large amount of e-waste is generated by ICT. These are in particular, terminal equipments
used for computing (PCs, laptops), broadcasting (television and radiosets), telephony (fixed and
mobile phones), and peripherals (fax machines, printers and scanners).
The accumulated e-waste is due to rapid turnover of equipment due to rapid
improvement of software. While material waste can be destroyed by crushing, toxic material
brought about by the different equipment requires utmost management. The quantities of ewaste are increasing in both developed and developing countries. A very dismal state is that there
is a significant amount of electronic waste that has been shipped from industrial countries to
developing countries, using less environmentally-responsible procedure.
Remedies include standardization and regulatory measures to increase the life cycle of
equipment before they become obsolete. Efficient extraction of toxic components and requiring
the recycling by both consumers and equipment vendors are selling must be required.
If not controlled then, e-waste will tremendously affect climate change, damage human
lives, and overload the capacity of the earth in carrying solid waste.
Implications to Teaching and Learning
How do the policy guidelines, projects and issues relate to the teaching and learning?
There are great implications of this lesson to both the teachers and learners. Few of these
are as follows:
For the Teachers
1. Guide the teachers on what they should teach that relate to ICT, and how to teach it.
Since ICT development comes so rapid and fast, teachers might be overwhelmed by
its rapid speed. Temperance in its use is a caution that should be looked at.
2. Technology should never replace any human teacher. The tools are support
instructional materials for the teachers which re available for use. The teacher should
learn how to appropriately use them. The human touch of the teacher is still a vital
component in teaching. Teachers should always be reminded that there are always
limitations in the use of the different gadget and tools.
3. There are rules and regulations that govern the use of technology. Caution should be
observes to protect individual privacy. As teachers, you must be aware that the use of
technology may jeopardize your privacy and security.
4. All the issues and many more shall be part of the teaching content as each teacher will
be encouraged to sue technology it teaching.
For the Learners
The learners of the 21st Century are even more advanced than some of the teachers.
However, learners still need guidance on how to use, regulate technology use. As there are
positive and negative effects of technology use, learners should know the difference. Learners
should not only know the difference of technology use, but they should also know how they can
be protected from the hazards that technology brings to their lives.
Learners should take advantage of the potential of earning support they can derive such
as the development of higher order thinking skills, the development of learning communities
through collaboration, the enhancement of skills to manage the vast resources as 21 st century
learners and many more.
Both the teachers and learners should be mindful of the e-waste that are being thrown
away to the land and to the atmosphere.
Technology is a phenomenon that seems to be uncontrollable. Despite the so many
benefits for teaching and learning, there are also negative effects or influence on the learners.
Hence, as future teachers you have to be aware of how to safeguard learners in the school
communities where they spend most of their waking hours and also in their homes or in facilities
that provide opportunities to use digital technologies.
Risks in the Use of Technology
1. Exposure to inappropriate content, including on-line pornography, extremism
(exposure to violence associated with racist language);
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyberbullying in all forms, receiving sexually explicit images or messages;
4. Privacy issues including disclosure of personal information;
5. Health and well-being (amount of time spent online, internet gaming and many
more;
6. Prolonged exposure to online technologies, particularly at an early age;
7. Addiction to gambling and gaming;
8. Theft and fraud from activities such as phishing;
9. Viruses, Trojans, spyware and other malware; and
10. Social pressure to maintain online networks via texting and social networking sites.
Minor Misuse of ICT
In school, some minor misuse made by learners include the following:





Copying information into assignment and failing to acknowledge the source
(plagiarism and copyright infringement)
Downloading materials not relevant to their studies
Misconduct associated with subject logins, such as using someone else password
Leaving a mobile phone turned on during class period
Unauthorized taking of pictures or images with mobile phone
e-Safety
e-safety takes care not only of internet technologies but also of electronic communications via
mobile phones, games consoles and wireless technology. It highlights the need to educate
children and young people about the benefits, risks and responsibilities of using information
technology.
Some issues of e-safety:




e-safety helps safeguard children and young people in the digital world;
e-safety emphasizes learning to understand new technologies in positive ways;
e-safety educates children about the risks as well as the benefits so we can feel
confident online; and
e-safety supports young learners and adults to develop safer online behaviors, both
in and out of school.
Network Management
1. Safety in the Use of Networking Schools
1.1 Make clear that no one should log on as another user.
1.2 Require all users to always log off when they have finished working.
1.3 Maintain all equipment to ensure health and safety.
1.4 Provide students with access to content and resources through guided e-learning.
1.5 Set up a clear disaster recovery system in place for critical data that include secure,
remote back up of critical data.
1.6 Secure wireless network to appropriate standards suitable for educational use.
1.7 Install all computer equipment professionally and meet health and safety standards.
1.8 Review the school ICT system regularly with regard to health and safety and
security.
2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to
disclose their passwords unless they got permission from the owner or from the
management. The equipment that keeps the personal information shall be locked
when unattended to prevent unauthorized access. Computers should be set to a
time out if they become unused for it certain period of time.
3. Personal mobile phones and mobile devices
3.1 All mobile phones shall be kept away in a box away from the children or learners and
access is only allowed at breaktime or at the end of classes or when needed during
the class period.
4. Cameras
4.1Taking pictures only from parents or caregivers and not from any their family
member or friend while the child attends class.
4.2 Any picture taken shall be on cameras solely for the purpose.
Setting Up An Educational Technology Room
Basic Safety Rules
1.
2.
3.
4.
5.
6.
7.
Provide tiltable tables.
Provide anti-glare screen filters.
Provide adjustable chairs.
Provide foot support.
Make sure lighting is suitable.
Make sure work stations are not cramped.
Plan work at a computer so that there are frequent breaks.
Safety Rules that can reduce risk of accidents in the working stations:
1.
2.
3.
4.
5.
6.
7.
8.
9.
No trailing wires across or around the room which people can trip on.
Electrical sockets should not be overloaded.
Electrical equipment should be safety-tested at least once a year.
There should be adequate space around desk for people to move.
Bags and obstacles should be stored out of the way.
Food and drinks should not be placed near machines.
Heating and ventilation should be suitable for working environment.
Fire extinguishers should be available.
Fire exits should be clearly marked and free from clutter.
References:
Bilbao, Purita P., et al. Technology for Teaching and Learning 1. Lorimar Publishing Inc.
Manila.
V.
Guide Questions
1. A friend would like to ask for your email password, because your email address
was used for an urgent matter. What action will you take?
2. Should we leave our lives to be controlled by technology or should we control
the utilization of technology in our lives? How?
VI.
Self-Learning Activities
This activity will be done by pair.
Task 1: Search the web and find out articles or cases about:
A.
B.
C.
D.
Freedom of Expression and Censorship
Privacy and Security
Surveillance and Data Retention
e-pollutants from e-waste
Choose only one article or case that you will work on. Use the template below to answer.
Title of the Issue: (Choose from A,B,C,D)_________________________________________
Title of the Article: __________________________________________________________
Source: ___________________________________________________________________
Author: ___________________________________________________________________
Reference: https://__________________________________________________________
Summary Narrative:
What lesson have you learned?
What suggestions can you offer?
Partner: _______________________________________________________________
Download