SlideShare a Scribd company logo
1 of 14
12
11
03
09
08
07
01
02
10
04
05
06
Lesson1: Policies and Issues on
Internetand Implications to
Teaching and Learning
B y : A l v a r a d o , J a y A n n
A m a d , R u t c h e l l e
12
11
03
09
08
07
02
10
04
05
06
Lesson
Outcomes
1. Named examples of ICT Policies which are applicable
to teachingand learning.
2. Discuss someissuesthat relate to theICTPolicy
01
12
11
03
09
08
07
01
10
04
05
06
ICT Policy
a course of action , adopted and pursued by a government,
party, ruler, statesman. It is any course of action adopted as expedient or
advantageous.
needed to put a roadmap or course of actions to be pursued an
adoptedbyvariousgovernments,organizations,entities involvingICT.
02
12
11
09
08
07
01
02
10
04
05
06
The New ICT Technologies
1. Information Technology => includes the use of computers, which has become indispensable
in modern societies to process dataand save time and effort.
2. Telecommunication Technologies => include telephones (with fax) and the broadcasting of
radioand television often through satellites.
3. Networking Technologies => the best known of networking technologies is Internet, but has
extended to mobile phone technology. Voice Over Internet Protocol (VOIP) satellite
communications and other forms of communications are still in their infancy.
03
12
11
03
09
08
07
01
02
10
05
06
The DICT Roadmap
guide all agencies in the utilization, regulation and enhancement of ICT. The
ICT for Education (ICT4E) is a program under the DICT that supports all the efforts of the
education sector in incorporating the use of ICT as well as in determining and gaining
access to the infrastructure (hardware, software, and telecommunications facilities and
others).
1. ICT in Education Master plan for all levels
2. Content and Application Development
3. PheDNET
4. Established Community eLearning
5.eQuality Program
6.Digital Media ArtsProgram
7.ICT Skills Strategic Plan
04
12
11
03
09
08
07
01
02
10
04
06
SomeIssues onICTandInternet PolicyandRegulations
Global Issues
Access and Civil Liberties are two sets of issues in ICT policy which are crucial to the
modern society. The other concern is civil liberties which refer to human rights and freedom.
These include freedom of expression, the right to privacy, the right to communicate an
intellectual propertyrights.
Access to Use of Internet and ICT. Access means the possibility for everyone to use
the internet and other media. In richer countries, basic access to internet is almost available to all
with faster broadband connections. These are still countries where access to internet is still a
challenge.
05
12
11
03
09
08
07
01
02
10
04
05
Infringement to Civil Liberties or Human Rights. What are specific
internet issues on internet policy that have relationship to civil liberties or human
rights? Let’s studytheexamples thatfollow.
IssueNo.1:Freedom ofExpression andCensorship
1.Individualrights are givenup inorder to haveaccessto electronic
networks.
2.Censorship restricts thetransmissionof informationby blockingitor
filtering theinformation.
3.Defamationactionsmaybe used to silence critics.
06
12
11
03
09
08
01
02
10
04
05
06
××××
WARNING!!!
“Whenyouaresurfing theweb,youmaythinkthatyouare
anonymous,butthere are variouswaysthatinformationaboutyou
andyouractivitiescanbecollected withoutyourconsent.”
07
12
11
03
09
07
01
02
10
04
05
06
Issue No. 2: Privacyand Security
1. For most, privacy means “personal privacy” the right of individuals not to have their home,
private life or personal life interfered with.
2. Privacy of communication refers to the protection from interference with communication
over the phone or internet. Respect for privacy of communications is an essential
prerequisite for the maintenance of human relationship via technological communications
media.
3. Information privacy is related to the use of computers and communications system which
are able to hold process information about large numbers of people at a high speed. It
important that information will only be used for purposes for which it was gathered and will
not ne disclosed toothers without consent the individuals.
08
12
11
03
08
07
01
02
10
04
05
06
IssueNo.3:Surveillance andDataRetention
The use of electronic communications enhanced the development of
indirect surveillance. In the indirect surveillance there is no direct contact between
the agent and the subject of surveillance but evidence activities be trace. The new
and powerful form indirect surveillance is dataveillance. Dataveillance is the use of
personal information to monitor a person’s activities while data retention is the
storageanduseof informationfrom communicationsystems.
09
12
11
03
09
08
07
01
02
04
05
06
IssueNo.4:E-pollutantsfrom E-waste
Large amount of e-waste is generated by ICT. These are in particular,
terminal equipment used for computing (PCs, laptops), broadcasting (television
and radio sets), telephony (fixed and mobile phones), and peripherals (fax
machines,printer andscanners).
The accumulated e-waste is due to rapid turnover of equipment due to
rapid improvement of software. While material waste can be destroyed by crushing,
toxic material brought about by the different equipment requires utmost
management. The quantities e-waste increasing in both developed and developing
countries.
10
12
03
09
08
07
01
02
10
04
05
06
Implications to Teachingand Learning
How do the policy guidelines, projects and issues relate to the teaching and
learning?
There are great implications of this lesson to both the teachers who are teaching
and the learners who are learning. A few theses as follows:
For the Teachers and Teaching
1.Guide the teachers on what they should teach that relate toICT, and how toteach
it.
2.Technology should replace any human teacher.
3.There are rules and regulations that govern the use of technology.
4.All the issues and manymore shall be partof teaching content.
11
11
03
09
08
07
01
02
10
04
05
06
For theLearners andLearning
The learners of the 21st Century are even more advanced than some of
the teachers. However, learners need still guidance how to use, regulate
technology use. As there are positive and negative effects of technology use,
learners should the difference. Learners should not only know the benefits of
technology use, but they should also know how they can protected from the
hazardsthattechnologybrings totheir lives.
12
12
11
03
09
08
07
01
02
10
04
05
06
Thank you 
Do youhaveany question ?

More Related Content

Similar to Reporting.pptx

Introduction to ICT.
Introduction to ICT. Introduction to ICT.
Introduction to ICT. JellyAntigro
 
Trans border data flow
Trans border data flowTrans border data flow
Trans border data flowSudeshnaDatta6
 
Q3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdfQ3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdfBryanSmile
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bwBridgetteWilliams15
 
RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...
RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...
RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...Muhammad Muhammad Suleiman
 
A New Technology Creates New Ethical Dilemmas New computer techn.docx
A New Technology Creates New Ethical Dilemmas New computer techn.docxA New Technology Creates New Ethical Dilemmas New computer techn.docx
A New Technology Creates New Ethical Dilemmas New computer techn.docxmehek4
 
foedumed: Computing issues that affect the society, 37-16
foedumed: Computing issues that affect the society, 37-16foedumed: Computing issues that affect the society, 37-16
foedumed: Computing issues that affect the society, 37-16Maliha Ghazal
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfarahsyed9
 
foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyMaliha Ghazal
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfarahsyed9
 
Information Communication Technology ( Ict )
Information Communication Technology ( Ict )Information Communication Technology ( Ict )
Information Communication Technology ( Ict )Melanie Erickson
 
Buy Linkedin Accounts - Cheap Bulk Accounts
Buy Linkedin Accounts - Cheap Bulk AccountsBuy Linkedin Accounts - Cheap Bulk Accounts
Buy Linkedin Accounts - Cheap Bulk AccountsCheap Bulk Accounts
 

Similar to Reporting.pptx (20)

GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
Introduction to ICT.
Introduction to ICT. Introduction to ICT.
Introduction to ICT.
 
ITED.docx
ITED.docxITED.docx
ITED.docx
 
Digital Divide.pptx
Digital Divide.pptxDigital Divide.pptx
Digital Divide.pptx
 
Act.1.8 aminta
Act.1.8 amintaAct.1.8 aminta
Act.1.8 aminta
 
Trans border data flow
Trans border data flowTrans border data flow
Trans border data flow
 
Q3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdfQ3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdf
 
ICT POLICIES AND ISSUES.pptx
ICT POLICIES AND ISSUES.pptxICT POLICIES AND ISSUES.pptx
ICT POLICIES AND ISSUES.pptx
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...
RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...
RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...
 
A New Technology Creates New Ethical Dilemmas New computer techn.docx
A New Technology Creates New Ethical Dilemmas New computer techn.docxA New Technology Creates New Ethical Dilemmas New computer techn.docx
A New Technology Creates New Ethical Dilemmas New computer techn.docx
 
foedumed: Computing issues that affect the society, 37-16
foedumed: Computing issues that affect the society, 37-16foedumed: Computing issues that affect the society, 37-16
foedumed: Computing issues that affect the society, 37-16
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the society
 
foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the society
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the society
 
IT.pptx
IT.pptxIT.pptx
IT.pptx
 
Information Communication Technology ( Ict )
Information Communication Technology ( Ict )Information Communication Technology ( Ict )
Information Communication Technology ( Ict )
 
Technology.
Technology.Technology.
Technology.
 
Buy Linkedin Accounts - Cheap Bulk Accounts
Buy Linkedin Accounts - Cheap Bulk AccountsBuy Linkedin Accounts - Cheap Bulk Accounts
Buy Linkedin Accounts - Cheap Bulk Accounts
 

Recently uploaded

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Reporting.pptx

  • 1. 12 11 03 09 08 07 01 02 10 04 05 06 Lesson1: Policies and Issues on Internetand Implications to Teaching and Learning B y : A l v a r a d o , J a y A n n A m a d , R u t c h e l l e
  • 2. 12 11 03 09 08 07 02 10 04 05 06 Lesson Outcomes 1. Named examples of ICT Policies which are applicable to teachingand learning. 2. Discuss someissuesthat relate to theICTPolicy 01
  • 3. 12 11 03 09 08 07 01 10 04 05 06 ICT Policy a course of action , adopted and pursued by a government, party, ruler, statesman. It is any course of action adopted as expedient or advantageous. needed to put a roadmap or course of actions to be pursued an adoptedbyvariousgovernments,organizations,entities involvingICT. 02
  • 4. 12 11 09 08 07 01 02 10 04 05 06 The New ICT Technologies 1. Information Technology => includes the use of computers, which has become indispensable in modern societies to process dataand save time and effort. 2. Telecommunication Technologies => include telephones (with fax) and the broadcasting of radioand television often through satellites. 3. Networking Technologies => the best known of networking technologies is Internet, but has extended to mobile phone technology. Voice Over Internet Protocol (VOIP) satellite communications and other forms of communications are still in their infancy. 03
  • 5. 12 11 03 09 08 07 01 02 10 05 06 The DICT Roadmap guide all agencies in the utilization, regulation and enhancement of ICT. The ICT for Education (ICT4E) is a program under the DICT that supports all the efforts of the education sector in incorporating the use of ICT as well as in determining and gaining access to the infrastructure (hardware, software, and telecommunications facilities and others). 1. ICT in Education Master plan for all levels 2. Content and Application Development 3. PheDNET 4. Established Community eLearning 5.eQuality Program 6.Digital Media ArtsProgram 7.ICT Skills Strategic Plan 04
  • 6. 12 11 03 09 08 07 01 02 10 04 06 SomeIssues onICTandInternet PolicyandRegulations Global Issues Access and Civil Liberties are two sets of issues in ICT policy which are crucial to the modern society. The other concern is civil liberties which refer to human rights and freedom. These include freedom of expression, the right to privacy, the right to communicate an intellectual propertyrights. Access to Use of Internet and ICT. Access means the possibility for everyone to use the internet and other media. In richer countries, basic access to internet is almost available to all with faster broadband connections. These are still countries where access to internet is still a challenge. 05
  • 7. 12 11 03 09 08 07 01 02 10 04 05 Infringement to Civil Liberties or Human Rights. What are specific internet issues on internet policy that have relationship to civil liberties or human rights? Let’s studytheexamples thatfollow. IssueNo.1:Freedom ofExpression andCensorship 1.Individualrights are givenup inorder to haveaccessto electronic networks. 2.Censorship restricts thetransmissionof informationby blockingitor filtering theinformation. 3.Defamationactionsmaybe used to silence critics. 06
  • 8. 12 11 03 09 08 01 02 10 04 05 06 ×××× WARNING!!! “Whenyouaresurfing theweb,youmaythinkthatyouare anonymous,butthere are variouswaysthatinformationaboutyou andyouractivitiescanbecollected withoutyourconsent.” 07
  • 9. 12 11 03 09 07 01 02 10 04 05 06 Issue No. 2: Privacyand Security 1. For most, privacy means “personal privacy” the right of individuals not to have their home, private life or personal life interfered with. 2. Privacy of communication refers to the protection from interference with communication over the phone or internet. Respect for privacy of communications is an essential prerequisite for the maintenance of human relationship via technological communications media. 3. Information privacy is related to the use of computers and communications system which are able to hold process information about large numbers of people at a high speed. It important that information will only be used for purposes for which it was gathered and will not ne disclosed toothers without consent the individuals. 08
  • 10. 12 11 03 08 07 01 02 10 04 05 06 IssueNo.3:Surveillance andDataRetention The use of electronic communications enhanced the development of indirect surveillance. In the indirect surveillance there is no direct contact between the agent and the subject of surveillance but evidence activities be trace. The new and powerful form indirect surveillance is dataveillance. Dataveillance is the use of personal information to monitor a person’s activities while data retention is the storageanduseof informationfrom communicationsystems. 09
  • 11. 12 11 03 09 08 07 01 02 04 05 06 IssueNo.4:E-pollutantsfrom E-waste Large amount of e-waste is generated by ICT. These are in particular, terminal equipment used for computing (PCs, laptops), broadcasting (television and radio sets), telephony (fixed and mobile phones), and peripherals (fax machines,printer andscanners). The accumulated e-waste is due to rapid turnover of equipment due to rapid improvement of software. While material waste can be destroyed by crushing, toxic material brought about by the different equipment requires utmost management. The quantities e-waste increasing in both developed and developing countries. 10
  • 12. 12 03 09 08 07 01 02 10 04 05 06 Implications to Teachingand Learning How do the policy guidelines, projects and issues relate to the teaching and learning? There are great implications of this lesson to both the teachers who are teaching and the learners who are learning. A few theses as follows: For the Teachers and Teaching 1.Guide the teachers on what they should teach that relate toICT, and how toteach it. 2.Technology should replace any human teacher. 3.There are rules and regulations that govern the use of technology. 4.All the issues and manymore shall be partof teaching content. 11
  • 13. 11 03 09 08 07 01 02 10 04 05 06 For theLearners andLearning The learners of the 21st Century are even more advanced than some of the teachers. However, learners need still guidance how to use, regulate technology use. As there are positive and negative effects of technology use, learners should the difference. Learners should not only know the benefits of technology use, but they should also know how they can protected from the hazardsthattechnologybrings totheir lives. 12