SlideShare a Scribd company logo
1 of 57
ICT POLICIES AND ISSUES:
IT’S IMPLICATION TO
TEACHING AND LEARNING
WHY ICT POLICIES ARE NEEDED?
•ICT policies are needed to put a
roadmap or course of action to be
pursued and adopted by various
governments, organization, entitles
involving ICT
•These includes principles and guidelines in
the use of ICT which cover three areas:
•Telecommunications (telephone)
•Broadcasting (radio and television), and
•Internet
NEW ICT TECHNOLOGIES
•The recent technological innovations
increased the reach and speed of
communication which can be grouped in
three categories:
1. Information Technology
2. Telecommunication Technologies
3. Networking Technologies
INFORMATION TECHNOLOGY
•This includes the use of computers ,
which has become indispensable in
modern societies to process data and
save time and effort. What are needed
will be computer hardware,
peripherals, software and for the user,
computer literacy
TELECOMMUNICATION TECHNOLOGIES
•These includes telephones and the
broadcasting radio and television
often through satellites. Telephone
system, radio, and TV broadcasting
are needed in this category
NETWORKING TECHNOLOGIES
• The best known networking technology is
internet, but it has extended to mobile phone
technology, Voice over internet Protocol
(VOIP)satellite communications and other forms
of communications are still in their infancy. In
addition to internet this category also includes
mobile telephone, cable and satellite and other
broadband connectivity
THE DICT ROADMAP
•In our country, the Department of
Information and Communication Technology
(DICT) has formulated a roadmap to guide
all agencies in the utilization, regulation
and enhancement of ICT. Each project has
corresponding policy statements and
guidelines
• The ICT for Education (ICT4E) is a program under
the DICT that supports all the efforts of the
education sector in incorporating the use of ICT
as well as in determining and gaining access to
the infrastructure( hardware, software,
telecommunications facilities and others) which
are necessary to use and employ learning
technologies at all level of education
POLICIES AND ISSUES ON INTERNET AND
IMPLICATIONS TO TEACHING AND LEARNING
•ICT in Education Masterplan for all
levels, including a National Roadmap
for Faculty Development in ICT in
Education. A national framework Plan
for ICTs in Basic Education was
developed
• Content and Application development through the
Open Content in Education Initiative (OCEI) which
converts DepED materials into interactive
multimedia content, develop applications used in
schools, and conduct students and teachers
competition to promote the development of
education-related content
• PheDNET, is a “walled” garden that hosts
educational learning and teaching materials and
application for use by Filipino students, their
parents and teachers. All public high schools will
be part of this network with only DepED approved
multimedia applications, materials and mirrored
Internet sites accessible from school’s PCs.
•Established Community eLearning
Centers called eSkwela for out-of-
school youth (SY) providing them
with ICT-enhanced alternative
education opportunities
•eQuality Program for tertiary education
through partnerships with the state
universities and colleges (SUCs) to
improve quality of IT education and the
use of ICT in education in the country,
particularly outside of Metro Manila
• Digital Media Arts Program which builds media
skills for government using Open Source
technologies, particular beneficiary agencies
include the Philippine Information Agency and
the other government media organizations, the
Cultural Center of the Philippines, National
Commission for Culture and Arts and other
agencies, SUCs and local government units
•ICT skills strategic plan which
develops an interagency approach
tio identifying strategic and policy
and program recommendations to
address ICT skills demand-supply
type
•All the seven programs were guided by
the roadmap that embeds policy
statements and relate to education
specifically in the enhancement of
human development for teaching and
learning
ICT ISSUES IN TEACHING AND LEARNING
Global Issues
• Access and civil liberties are two sets of issues in ICT policy
which are crucial to the moderns society. The other concern
is civil liberties which refer to human rights and freedom
• These includes
1. Freedom of Expression
2. The right to privacy
3. The right to communicate
4. Intellectual property rights
ISSUE NO.1:FREEDOM OF EXPRESSION AND
CENCORSHIP
• Under international human rights conventions, all
people are guaranteed the right for free
expression, However, with the shift from
communicating through letter, newspaper and
public meetings to electronic communications
and online networking, a need to look into how
these new means modifies the understanding of
freedom of expression and censorship
•The UN Universal Declaration of Human
Rights provides that everyone has the
right to freedom of thought,
conscience, and religion, likewise the
right to freedom of opinion and
expression
• Censorship restricts the transmission of information by
blocking it or filtering the information . Blocking is
preventing access to whole areas of Internet based upon the
“blacklist” of certain Internet address, location, or email
addresses while filtering is sitting the packets of data or
messages as they move across computer networks and
eliminating those considered “undesirable” materials.
• The selection of sites that are blocked or filtered has been
considered as an issue
WARNING!!
• “When you are surfing the web, you may
think you are anonymous, but there are
various ways that information about you
or your activities can be collected without
your consent”
ISSUE NO.2: PRIVACY AND SECURITY
•Defamation actions may be
use to silence critics. This
action deters the freedom of
expression
•Privacy policies are an issue. Most
commercial sites have a privacy policy.
When someone uses a site and clicks “I
agree” button, it is as if you have turned
over private information to any authority
that may access it
THERE ARE TYPES OF PRIVACY AS SHOWN
BY THE FOLLOWING EXAMPLES
•For most, privacy means “personal
privacy” the right of individuals not
to have their home, private life or
personal life interfered with
•Privacy of communication refers to the
protection from interference with
communication over the phone or internet.
Respect of privacy communications is an
essential prerequisite for the maintenance
of human relationship via technological
communication media
• Information privacy is related to the use of
computers and communications system which are
able to hold and process information about large
numbers of people at a high speed. It is
important to ensure that information will only be
used for purposes for which it was gathered and
will not be disclosed to others without consent of
the individuals.
ISSUE NO.3: SURVEILLANCE AND DATA
RETENTION
• The use of electronic communications has
enhanced the development of indirect
surveillance
• In the direct surveillance, there is no direct
contact between the agent and the subject of
surveillance but the evidence of activities can be
traced
•The new and powerful form of indirect
surveillance is detaveillance. It is the
use of personal information to monitor
a person’s activities while data
retention is the storage and use of
information from communication
system
REMINDER!!
• There is very little that can be done to prevent
surveillance. What can be done is to make
surveillance difficult. This is called “counter
surveillance” or “information security” if it
refers to computer and electronic
communication
ISSUE NO. 4: E-POLLUTANTS FROM E-WASTE
•Large amount of e-waste is generated by
ICT. These are in particular, terminal
equipment used for computing (PCs,
laptops), broadcasting (television and radio
sets), telephony (fixed mobile phones), and
peripherals (fax machines, printers,
scanner)
•The accumulated e-waste is due to
rapid turnover of equipment of
software. While material waste can be
destroyed by crushing, toxic materials
brought about by different equipment
requires utmost management
• Remedies include standardization and regulatory
measures to incres the life cycle of equipment before
they become obsolete. Efficient extraction of toxic
components and requiring the recycling of both
consumers and equipment vendors are selling must be
required
• If not controlled then, e-waste will tremendously affect
climate change, damage human lives, and overload the
capacity of the earth carrying solid waste
IMPLICATION TO TEACHING AND LEARNING
•How do the policy guidelines, projects and
issues relate to the teaching and learning?
FOR THE TEACHERS AND TEACHING
•Guide the teachers on what they should
teach that relate to ICT, and how to teach it
•Technology should never replace any human
teacher
•There are rules and regulations that govern
the use of technology. Caution should
observed to protect individual policy
•All the issues and many more shall be part
of the teaching content as each teacher will
be encouraged to use techonology in
teaching
FOR THE LEARNERS AND LEARNING
•The learners of the 21st century are
even more advanced that some of
the teachers. However, learners still
need guidance on how to use and
regulate technology use.
SAFETY ISSUES ON THE USE OF ICT
INCLUDING E-SAFETY RULES
SOME RISKS IN THE USE OF ICT AND E-
NETWORKING
• Exposure to inappropriate content, including on-
line pornography, extremism (exposure to vilence
associated with racist language)
• Lifestyle websites like self-harms and suicide
sites and hates sites
• Cyber-bullying in all forms, receiving sexually
explicit images or messages
• Privacy issues including disclosure of personal
information
• Health and well being (among of time spent on-
line, internet gaming and many more)
• Prolonged exposure to on-line technologies,
particularly at an early age
• Addiction to gambling and gaming
•Theft and fraud from activities such as
phishing
•Viruses , Trojans, spyware and other
malware: and
•Social pressure to maintain online
networksvia texting and social networking
sites
MINOR MISUSE OF ICT
• In school, some minor misuse made by learners:
• Copying information into assignment and failing to
acknowledge the source (plagiarism and copy right
infringment)
• Downloading material not relevant to their studies
• Misconduct associated with subject logins, such as
someone else’s password
•Leaving a mobile phone turned on
during class period
•Unauthorized taking of pictures or
images with mobile phone camera, still
or moving
e-Safety
•Take care not only of internet
technologies but also electronic
communications via mobile phones,
games consoles and wireless technology
E-Safety Tips
• People you don’t know are strangers. They’re not
always who they say they are
• Be nice to people like you would on the
playground
• Keep your personal information private
• If you ever get that “uh oh” feeling, tell a grown-
up you trust
Some Issues of e-Safety
• e-Safety helps safeguard children and young people in
the digital world
• e-Safety emphasizes learning to understand and new
technologies in a positive ways
• e-Safety educates children about the risks as well as the
benefits so we can feel confident online
• e-Safety supports young learners and adults to develop
safer online behaviours, both in and out of school
NETWORK MANAGEMENT
1. Safety in the use of network in schools
• Make clear that no one should log on as another user
• Require all users to always log off when they have
finish working
• Maintain equipment to ensure health and safety
• Provide students with access to content and resource
through guided e-learning
• Set up clear disaster recovery system in place for critical
data that include secure remote back up of critical data
• Secure wireless network to appropriate standards
suitable for educational use
• Install all computer equipment professionally and meet
health and safety standards
• Review the school ICT system regularly with regard to
health and safety and security
2. Password Policy
• Only authorized users will have individual
passwords
3. Personal mobile phones and mobile devices
• All mobile phones shall be kept away in a box
from the learners and access is only allowed at
breaktime or at the end of class or when needed
during the class period
4. Cameras
• Taking pictures only parents or caregivers and not
from any other family members or friend while
the child attends class
• Any pictures taken of children shall be on
cameras solely for the purpose
Setting Up an Educational Technology Room
1. Provide tiltable tables
2. Provide anti-glare screen filters
3. Provide adjustable chairs
4. Provide foot support
5. Make sure lighting is suitable
6. Make sure work station are not cramped
7. Plan work at a computers so that there are frequent
breaks
More specifically safety rules that can reduce
risk of accidents in the working stations should
include:
1. No trailing wires across or arounf the room while
people can trip
2. Electrical sockets should not be overload
3. Electrical equipment should be safety-tested at least
once a year
4. There should be adequate space around desk for people
to move
5. Bags and obstacles should be stored out of the way
6. Foods and drinks should not be placed near a
machines
7. Heating and ventilation should be suitable for
the working environment
8. Fire extinguishers should be available
9. Fire exits should be clearly marked and free
from clutter

More Related Content

What's hot

LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGAllan Lloyd Martinez
 
Safety issues with ICT
Safety issues with ICTSafety issues with ICT
Safety issues with ICTcomputers 11
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipJohan Koren
 
Technology for Teaching and Learning 1
Technology for Teaching and Learning 1Technology for Teaching and Learning 1
Technology for Teaching and Learning 1RheanneMaePrincesa
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Reji Mae Sunot
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxZaideMangondato1
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointJannahAboulhassan
 
Digital Literacy Skills in the 21st Century
Digital Literacy Skills in the 21st Century Digital Literacy Skills in the 21st Century
Digital Literacy Skills in the 21st Century Ira Sagu
 
Lesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationLesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationIra Sagu
 
ICT Strategic Vision and Plan
ICT Strategic Vision and PlanICT Strategic Vision and Plan
ICT Strategic Vision and PlanSave the Children
 
Cyber / digital literacy.pptx
Cyber / digital literacy.pptxCyber / digital literacy.pptx
Cyber / digital literacy.pptxFloralyn Victoria
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Digital literacy skills in the 21st century
Digital literacy skills in the 21st centuryDigital literacy skills in the 21st century
Digital literacy skills in the 21st centurytcc_joemarie
 
educational technology in philippines
educational technology in philippineseducational technology in philippines
educational technology in philippinesMargie Curre
 

What's hot (20)

LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
 
Safety issues with ICT
Safety issues with ICTSafety issues with ICT
Safety issues with ICT
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Technology for Teaching and Learning 1
Technology for Teaching and Learning 1Technology for Teaching and Learning 1
Technology for Teaching and Learning 1
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptx
 
Ict policies and issues
Ict policies and issuesIct policies and issues
Ict policies and issues
 
Ict integration by 216019875
Ict integration by 216019875Ict integration by 216019875
Ict integration by 216019875
 
Integration of ICT in Teaching and Learning
Integration  of  ICT in Teaching and LearningIntegration  of  ICT in Teaching and Learning
Integration of ICT in Teaching and Learning
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Digital Literacy Skills in the 21st Century
Digital Literacy Skills in the 21st Century Digital Literacy Skills in the 21st Century
Digital Literacy Skills in the 21st Century
 
Lesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationLesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher education
 
ICT Strategic Vision and Plan
ICT Strategic Vision and PlanICT Strategic Vision and Plan
ICT Strategic Vision and Plan
 
Cyber / digital literacy.pptx
Cyber / digital literacy.pptxCyber / digital literacy.pptx
Cyber / digital literacy.pptx
 
Basic education curriculum
Basic education curriculumBasic education curriculum
Basic education curriculum
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Digital literacy skills in the 21st century
Digital literacy skills in the 21st centuryDigital literacy skills in the 21st century
Digital literacy skills in the 21st century
 
educational technology in philippines
educational technology in philippineseducational technology in philippines
educational technology in philippines
 

Similar to ICT POLICIES AND ISSUES.pptx

Unit-8 part-2.pptx
Unit-8 part-2.pptxUnit-8 part-2.pptx
Unit-8 part-2.pptxMariamawan8
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptxINFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptxJeanDacles
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdfShieAnneGarcia
 
Information and Communication Technology (ICT)
Information and Communication Technology (ICT)Information and Communication Technology (ICT)
Information and Communication Technology (ICT)mehraj aslam
 
Presentation on science and technology
Presentation on science and technologyPresentation on science and technology
Presentation on science and technologysce,bhopal
 
ICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptxICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptxHanelynDZAmudio
 
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdfmodule-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdfJanetLipataPajuelas
 
Introduction to ICT.
Introduction to ICT. Introduction to ICT.
Introduction to ICT. JellyAntigro
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in EducationIndrani Rengasamy
 
Information and Communication Technology In Education
Information and Communication Technology In EducationInformation and Communication Technology In Education
Information and Communication Technology In EducationVijayalakshmi Murugesan
 
educational-technology-2-pptx
educational-technology-2-pptxeducational-technology-2-pptx
educational-technology-2-pptxCris Capilayan
 

Similar to ICT POLICIES AND ISSUES.pptx (20)

Week 4 - 6.pdf
Week 4 - 6.pdfWeek 4 - 6.pdf
Week 4 - 6.pdf
 
educ 103
educ 103educ 103
educ 103
 
Unit-8 part-2.pptx
Unit-8 part-2.pptxUnit-8 part-2.pptx
Unit-8 part-2.pptx
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptxINFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT).pptx
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdf
 
Information and Communication Technology (ICT)
Information and Communication Technology (ICT)Information and Communication Technology (ICT)
Information and Communication Technology (ICT)
 
Presentation on science and technology
Presentation on science and technologyPresentation on science and technology
Presentation on science and technology
 
Shareefsab
ShareefsabShareefsab
Shareefsab
 
Santu 2
Santu 2Santu 2
Santu 2
 
ICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptxICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptx
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdfmodule-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
 
Introduction to ICT.
Introduction to ICT. Introduction to ICT.
Introduction to ICT.
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
Information and Communication Technology In Education
Information and Communication Technology In EducationInformation and Communication Technology In Education
Information and Communication Technology In Education
 
ict.pptx
ict.pptxict.pptx
ict.pptx
 
the technology.pptx
the technology.pptxthe technology.pptx
the technology.pptx
 
educational-technology-2-pptx
educational-technology-2-pptxeducational-technology-2-pptx
educational-technology-2-pptx
 
Assignment
AssignmentAssignment
Assignment
 
Educational technology 2
Educational technology 2Educational technology 2
Educational technology 2
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 

ICT POLICIES AND ISSUES.pptx

  • 1. ICT POLICIES AND ISSUES: IT’S IMPLICATION TO TEACHING AND LEARNING
  • 2. WHY ICT POLICIES ARE NEEDED? •ICT policies are needed to put a roadmap or course of action to be pursued and adopted by various governments, organization, entitles involving ICT
  • 3. •These includes principles and guidelines in the use of ICT which cover three areas: •Telecommunications (telephone) •Broadcasting (radio and television), and •Internet
  • 4. NEW ICT TECHNOLOGIES •The recent technological innovations increased the reach and speed of communication which can be grouped in three categories: 1. Information Technology 2. Telecommunication Technologies 3. Networking Technologies
  • 5. INFORMATION TECHNOLOGY •This includes the use of computers , which has become indispensable in modern societies to process data and save time and effort. What are needed will be computer hardware, peripherals, software and for the user, computer literacy
  • 6. TELECOMMUNICATION TECHNOLOGIES •These includes telephones and the broadcasting radio and television often through satellites. Telephone system, radio, and TV broadcasting are needed in this category
  • 7. NETWORKING TECHNOLOGIES • The best known networking technology is internet, but it has extended to mobile phone technology, Voice over internet Protocol (VOIP)satellite communications and other forms of communications are still in their infancy. In addition to internet this category also includes mobile telephone, cable and satellite and other broadband connectivity
  • 8. THE DICT ROADMAP •In our country, the Department of Information and Communication Technology (DICT) has formulated a roadmap to guide all agencies in the utilization, regulation and enhancement of ICT. Each project has corresponding policy statements and guidelines
  • 9. • The ICT for Education (ICT4E) is a program under the DICT that supports all the efforts of the education sector in incorporating the use of ICT as well as in determining and gaining access to the infrastructure( hardware, software, telecommunications facilities and others) which are necessary to use and employ learning technologies at all level of education
  • 10. POLICIES AND ISSUES ON INTERNET AND IMPLICATIONS TO TEACHING AND LEARNING •ICT in Education Masterplan for all levels, including a National Roadmap for Faculty Development in ICT in Education. A national framework Plan for ICTs in Basic Education was developed
  • 11. • Content and Application development through the Open Content in Education Initiative (OCEI) which converts DepED materials into interactive multimedia content, develop applications used in schools, and conduct students and teachers competition to promote the development of education-related content
  • 12. • PheDNET, is a “walled” garden that hosts educational learning and teaching materials and application for use by Filipino students, their parents and teachers. All public high schools will be part of this network with only DepED approved multimedia applications, materials and mirrored Internet sites accessible from school’s PCs.
  • 13. •Established Community eLearning Centers called eSkwela for out-of- school youth (SY) providing them with ICT-enhanced alternative education opportunities
  • 14. •eQuality Program for tertiary education through partnerships with the state universities and colleges (SUCs) to improve quality of IT education and the use of ICT in education in the country, particularly outside of Metro Manila
  • 15. • Digital Media Arts Program which builds media skills for government using Open Source technologies, particular beneficiary agencies include the Philippine Information Agency and the other government media organizations, the Cultural Center of the Philippines, National Commission for Culture and Arts and other agencies, SUCs and local government units
  • 16. •ICT skills strategic plan which develops an interagency approach tio identifying strategic and policy and program recommendations to address ICT skills demand-supply type
  • 17. •All the seven programs were guided by the roadmap that embeds policy statements and relate to education specifically in the enhancement of human development for teaching and learning
  • 18. ICT ISSUES IN TEACHING AND LEARNING
  • 19. Global Issues • Access and civil liberties are two sets of issues in ICT policy which are crucial to the moderns society. The other concern is civil liberties which refer to human rights and freedom • These includes 1. Freedom of Expression 2. The right to privacy 3. The right to communicate 4. Intellectual property rights
  • 20. ISSUE NO.1:FREEDOM OF EXPRESSION AND CENCORSHIP • Under international human rights conventions, all people are guaranteed the right for free expression, However, with the shift from communicating through letter, newspaper and public meetings to electronic communications and online networking, a need to look into how these new means modifies the understanding of freedom of expression and censorship
  • 21. •The UN Universal Declaration of Human Rights provides that everyone has the right to freedom of thought, conscience, and religion, likewise the right to freedom of opinion and expression
  • 22. • Censorship restricts the transmission of information by blocking it or filtering the information . Blocking is preventing access to whole areas of Internet based upon the “blacklist” of certain Internet address, location, or email addresses while filtering is sitting the packets of data or messages as they move across computer networks and eliminating those considered “undesirable” materials. • The selection of sites that are blocked or filtered has been considered as an issue
  • 23. WARNING!! • “When you are surfing the web, you may think you are anonymous, but there are various ways that information about you or your activities can be collected without your consent”
  • 24. ISSUE NO.2: PRIVACY AND SECURITY
  • 25. •Defamation actions may be use to silence critics. This action deters the freedom of expression
  • 26. •Privacy policies are an issue. Most commercial sites have a privacy policy. When someone uses a site and clicks “I agree” button, it is as if you have turned over private information to any authority that may access it
  • 27. THERE ARE TYPES OF PRIVACY AS SHOWN BY THE FOLLOWING EXAMPLES •For most, privacy means “personal privacy” the right of individuals not to have their home, private life or personal life interfered with
  • 28. •Privacy of communication refers to the protection from interference with communication over the phone or internet. Respect of privacy communications is an essential prerequisite for the maintenance of human relationship via technological communication media
  • 29. • Information privacy is related to the use of computers and communications system which are able to hold and process information about large numbers of people at a high speed. It is important to ensure that information will only be used for purposes for which it was gathered and will not be disclosed to others without consent of the individuals.
  • 30. ISSUE NO.3: SURVEILLANCE AND DATA RETENTION
  • 31. • The use of electronic communications has enhanced the development of indirect surveillance • In the direct surveillance, there is no direct contact between the agent and the subject of surveillance but the evidence of activities can be traced
  • 32. •The new and powerful form of indirect surveillance is detaveillance. It is the use of personal information to monitor a person’s activities while data retention is the storage and use of information from communication system
  • 33. REMINDER!! • There is very little that can be done to prevent surveillance. What can be done is to make surveillance difficult. This is called “counter surveillance” or “information security” if it refers to computer and electronic communication
  • 34. ISSUE NO. 4: E-POLLUTANTS FROM E-WASTE
  • 35. •Large amount of e-waste is generated by ICT. These are in particular, terminal equipment used for computing (PCs, laptops), broadcasting (television and radio sets), telephony (fixed mobile phones), and peripherals (fax machines, printers, scanner)
  • 36. •The accumulated e-waste is due to rapid turnover of equipment of software. While material waste can be destroyed by crushing, toxic materials brought about by different equipment requires utmost management
  • 37. • Remedies include standardization and regulatory measures to incres the life cycle of equipment before they become obsolete. Efficient extraction of toxic components and requiring the recycling of both consumers and equipment vendors are selling must be required • If not controlled then, e-waste will tremendously affect climate change, damage human lives, and overload the capacity of the earth carrying solid waste
  • 38. IMPLICATION TO TEACHING AND LEARNING •How do the policy guidelines, projects and issues relate to the teaching and learning?
  • 39. FOR THE TEACHERS AND TEACHING •Guide the teachers on what they should teach that relate to ICT, and how to teach it •Technology should never replace any human teacher
  • 40. •There are rules and regulations that govern the use of technology. Caution should observed to protect individual policy •All the issues and many more shall be part of the teaching content as each teacher will be encouraged to use techonology in teaching
  • 41. FOR THE LEARNERS AND LEARNING •The learners of the 21st century are even more advanced that some of the teachers. However, learners still need guidance on how to use and regulate technology use.
  • 42. SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
  • 43. SOME RISKS IN THE USE OF ICT AND E- NETWORKING • Exposure to inappropriate content, including on- line pornography, extremism (exposure to vilence associated with racist language) • Lifestyle websites like self-harms and suicide sites and hates sites • Cyber-bullying in all forms, receiving sexually explicit images or messages
  • 44. • Privacy issues including disclosure of personal information • Health and well being (among of time spent on- line, internet gaming and many more) • Prolonged exposure to on-line technologies, particularly at an early age • Addiction to gambling and gaming
  • 45. •Theft and fraud from activities such as phishing •Viruses , Trojans, spyware and other malware: and •Social pressure to maintain online networksvia texting and social networking sites
  • 46. MINOR MISUSE OF ICT • In school, some minor misuse made by learners: • Copying information into assignment and failing to acknowledge the source (plagiarism and copy right infringment) • Downloading material not relevant to their studies • Misconduct associated with subject logins, such as someone else’s password
  • 47. •Leaving a mobile phone turned on during class period •Unauthorized taking of pictures or images with mobile phone camera, still or moving
  • 48. e-Safety •Take care not only of internet technologies but also electronic communications via mobile phones, games consoles and wireless technology
  • 49. E-Safety Tips • People you don’t know are strangers. They’re not always who they say they are • Be nice to people like you would on the playground • Keep your personal information private • If you ever get that “uh oh” feeling, tell a grown- up you trust
  • 50. Some Issues of e-Safety • e-Safety helps safeguard children and young people in the digital world • e-Safety emphasizes learning to understand and new technologies in a positive ways • e-Safety educates children about the risks as well as the benefits so we can feel confident online • e-Safety supports young learners and adults to develop safer online behaviours, both in and out of school
  • 51. NETWORK MANAGEMENT 1. Safety in the use of network in schools • Make clear that no one should log on as another user • Require all users to always log off when they have finish working • Maintain equipment to ensure health and safety • Provide students with access to content and resource through guided e-learning
  • 52. • Set up clear disaster recovery system in place for critical data that include secure remote back up of critical data • Secure wireless network to appropriate standards suitable for educational use • Install all computer equipment professionally and meet health and safety standards • Review the school ICT system regularly with regard to health and safety and security
  • 53. 2. Password Policy • Only authorized users will have individual passwords 3. Personal mobile phones and mobile devices • All mobile phones shall be kept away in a box from the learners and access is only allowed at breaktime or at the end of class or when needed during the class period
  • 54. 4. Cameras • Taking pictures only parents or caregivers and not from any other family members or friend while the child attends class • Any pictures taken of children shall be on cameras solely for the purpose
  • 55. Setting Up an Educational Technology Room 1. Provide tiltable tables 2. Provide anti-glare screen filters 3. Provide adjustable chairs 4. Provide foot support 5. Make sure lighting is suitable 6. Make sure work station are not cramped 7. Plan work at a computers so that there are frequent breaks
  • 56. More specifically safety rules that can reduce risk of accidents in the working stations should include: 1. No trailing wires across or arounf the room while people can trip 2. Electrical sockets should not be overload 3. Electrical equipment should be safety-tested at least once a year 4. There should be adequate space around desk for people to move 5. Bags and obstacles should be stored out of the way
  • 57. 6. Foods and drinks should not be placed near a machines 7. Heating and ventilation should be suitable for the working environment 8. Fire extinguishers should be available 9. Fire exits should be clearly marked and free from clutter