SlideShare a Scribd company logo
1 of 27
Download to read offline
Pilot Run in the Philippines of the
APEC Training Program for Preventive Education on ICT Misuse

Brief Project Report
15 February 2010
http://responsibleuseofict.wikispaces.com
APEC ICT Net Project
• 2006-2007 by KTCF and AEF
• a culture of healthy ICT use and adverse effects of
  ICT use
• Activities:
   – research, content development
   – educational campaign through a poster competition
   – content localization and distribution through pilot use of
     the content in local training workshops (Peru and the
     Philippines)
APEC Training Program for Preventive
           Education on ICT Misuse
• KTCF and APWINC
• enhancements on the previous training design
  and materials + training rollout
• International Symposium on ‘Safe and Trusted
  ICT/ Internet Use, Actions Against Internet
  Misuse’ in September 2009
• Training workshops – Philippines & Indonesia
Responsible Use of ICT
• Pilot Philippine run
• Commission on Information and Communications
  Technology and Svillupo Consulting Services
  Cooperative
• Enhancement of CICT’s existing Computer and
  Internet Literacy Course (CILC) by incorporating KTCF
  materials
Responsible Use of ICT
Regular CILC run                   Special CILC run
•5 days                            •3 days
•Topics covered:                   •Topics covered:
   • ICT Basics (includes Proper      • ICT Basics
     Use of Computers)                • Internet
   • Internet                         • Responsible Use of ICT
   • Word Processing                    (combination of proper use
   • Spreadsheet                        of computers, Cyber
   • Multimedia Presentation            Security and Ethics)
   • Cyber Security and Ethics     •Materials:
•Materials:                           • Combination of regular
   • Locally developed                  CILC run materials +
   • Web-based videos/photos            selected appropriate KTCF
   • Games, activities                  videos & activities
Responsible Use of ICT
• Involved groups:
   –   iSchools Project – 5 trainers
   –   eSkwela Project – 5 trainers
   –   Digital Bridges Program – 4 trainers
   –   CILC(7) e-module reviewers (eSkwela) – 2
• Contracted an external Master Trainer
• Target end-user participants: zero- ICT
  knowledge/skills
Activities
activity              objective                              Date & venue       Participants
Training of Trainers To come up with the respective 3-day Dec 9-11, 2009        16 trainers
                     end-user training workshop design    Mimosa                Project team
                     and plan for the end-user training                         KTCF
                     implementation
End-user Training -   To train zero-ICT knowledge/skills     Jan 18-21, 2010    20 elementary
iSchools              participants on the responsible use    BPSU-Orani         teachers-DepEd-
                      of ICT                                                    Orani
                      Topics:
End-user Training -   •ICT Basics                            Jan 18-21, 2010    20 out-of-school
eSkwela               •Internet                              eSkwela-Telof QC   youth and adults
                      •Responsible Use of ICT                                   from 3 Quezon City
                                                                                areas
End-user Training -                                          Jan 18-21, 2010    20 community
Digital Bridges                                              ADOC Lab, CICT     leaders & volunteers
                                                                                from 4 ADOC areas
Debriefing            To evaluate the training program       Jan 22-23, 2010    16 trainers
                      (experiences, challenges, lessons      Seminar Rm, CICT   Project team
                      learned, good practices) and provide                      KTCF
                      recommendations for next steps
Highlights: Training of Trainers
Topics covered
1. Basic Project Planning
2. Profile of a Novice ICT User
3. Characteristics of a Responsible ICT User
4. Review of KTCF Materials (for possible
   incorporation into own training designs)
5. Creating the Responsible Use Agreement
6. Creating the Competency-Strategy-Material
   Framework
7. Creating the Training Design
Feedback from the Participants (Trainers)
              on the ToT
• Appreciated lectures/inputs from the 3 Korean professors
   –   Internet, Game and Pornography Addiction
   –   Legal System to protect IPR
   –   Netiquette
   –   Comparison of Korean experience with local status/context
• 2 ½ days for the ToT is too short
• Teams were adequately prepared in planning for their EUTs
• Customization of their training designs was imperative due to
  dissimilar target clients
Highlights: End-User Training
iSchools    • Participants: 28 years to 45 years old (teachers)
            • Used most (if not all) of the KTCF videos provided – use of animation as a means
              to convey lessons much more than presentations per se
            • Use of personal stories and situations; role-playing
eSkwela     • Participants: 14 years to 52 years old (out-of-school youth / adults)
            • Medium of instruction: Filipino
            • Use of analogies, local cases, and physical activities instead of immersing the
              learners immediately into the technology
            • Incorporated the module on Preventing VDT Syndrome into their icebreakers and
              warm-up exercises to instill the habit or proper posture and exercises in the
              learners
            • Workshop on setting rules for responsible ICT use
            • used most if not all KTCF videos
Digital     • Participants: 18 years to 67 years old (community leaders/volunteers); majority
              were zero-knowledge/skill ICT users with technophobia (i.e. wary of powering
Bridges
              the computer on/off and clicking the mouse)
            • Group work on different cyber crimes (how to solve and come up with a set of
              computer ethics or netiquette)
                 – Strategy: Video – Process – Lecture use of videos, small group discussion, plenary
                   presentation
KTCF Resources/Activities Used
                  Topics covered                   iSchools                         eSkwela                  Digital Bridges
ICT Basics    •   ICT concepts                                            •   Video: VDT Syndrome
              •   Use of Computer                                         •   Icebreaker: VDT exercises
                  components                                              •   Labeling the parts of the
              •   Accessing Software                                          computer (input & output
              •   File Management                                             devices)
                                                                          •   Some KTCF slides

Internet      •   Communication tools:    •   Video & Slides: Two         •   Thread Connection              •   Video:
                  email, instant              Faces of the Internet,      •   Passing the Message                Protecting
                  messaging                                               •   Video & Activity: Two              Personal
              •   Browser use/ Search                                         Faces of the Internet,             Information,
                  Engine                                                      Protecting Personal
              •   eCommerce,                                                  Information
                  entertainment, social                                   •   KTCF slides: Internet
                  networking                                                  Suppliers and Consumers

Responsible   •   Proper Use              • Slides: games, internet       • KTCF slides                      • Videos:
              •   Benefits and issues       addiction, Cyber bullying,    • Videos:                              •   Copyright
Use of ICT        concerning ICT use        netiquette                        •   Netiquette                         Protection
              •   Cybercrimes             • Videos:                           •   Verbal Violence                •   Phishing Scam
                                              • Copyright Protection          •   Internet Addiction             •   Pornography
                                              • VDT Syndrome                  •   Pornography Addiction              Addiction
                                              • Provision of False            •   Game Addiction
                                                Information                   •   Mobile Phone Addiction
                                              • Mobile Phone Manners          •   Copyright Protection
                                              • Cyber Security                •   Self-control in Watching
                                              • Malware                           Indecent Contents
                                              • Account Compromise
                                              • Confusion Between
                                                Cyberspace and Reality
                                              • Phishing
                                              • Production and
                                                Distribution of Viruses
Feedback from the Trainers
                  on the EUT
• All of the sessions were found to be useful to the participants
• Session or Module 1 is the most challenging because it all
  starts from there
• There should always be an activity related to the topics before
  starting the lectures to better understand the lessons.
• Training materials: Should not be too technical, participants
  might not understand fully what is in the training materials
• Device a way on how to measures the knowledge being
  imparted by the trainers, probably an exam 4 to 5 questions
  on the previous lectures before proceeding to the next
  lectures.
Feedback from the Participants on the
                EUT
•   “APEC” label: very much appreciated
•   KTCF videos would be better understood if they were
    dubbed in Filipino and had Filipino subtitles
•   3-day exposure/training is too short; need for follow-up
    sessions
•   Fear: to lose what they learned because they do not have
    constant and frequent access to ICTs to practice what they
    learned
•   Thankful for the opportunity and the allowances
Highlights: Debriefing
•   After Action Review
    –   project’s goals
    –   what happened
    –   factors that accounted for differences in planning vs.
        execution
    –   improvements for the next run.
•   Documenting the EUT.
    –   answers to the four AAR questions
    –   modified Training Design
    –   Trainer’s Guidebook
    –   Training Report
General Observations
• Responsible Use of ICT is necessary
• KTCF materials are useful
   – Better if dubbed in Filipino
   – Flexible use: welcomed
• Customization is necessary (training designs and
  materials)
• Team teaching works!
• Fast Internet connection during training runs is
  crucial
• Wiki habit not ingrained
Challenges
• Technical problems
   – Slow and/or intermittent internet connection
   – No printer was available for printer-related exercises
   – Available computers could not play KTCF videos
• Coordination gaps with the participants in terms of schedule
• Participants had difficulty understanding some of the resource
  materials because these were in English.
• None of the project teams reported successfully carrying out
  the activity on creating laboratory policies or responsible use
  agreements.
• Training participants took longer than expected to grasp basic
  concepts
   – training teams had to adjust accordingly
Recommendations:
                   Training Design
• Training objectives must consider the following:
   – ICT know-how of trainees
   – Available time/duration
   – Available resources, particularly infrastructure
• Rollout and further tweaking
   – Longer training period for participants with zero-ICT
     knowledge/skills
• a two-(or even three-) part workshop is desirable to
  attain learning for a “zero-knowledge” ICT trainee to
  a responsible ICT user
Recommendations:
            Training Pre-requisites
• Training on responsible use of ICT might be better
  discussed among Level 2 users in a follow-up
  workshop (after a few weeks)
   – rather than to Level 1 zero-knowledge/skills who are just
     starting to appreciating ICT use
Recommendations:
               Training Strategies
• use Filipino context and actual situations
• Using a form of
   – pre-assessment prior to training to establish the
     true level of ICT knowledge of the trainees
   – post-assessment after training (immediately as
     well as after 3 months) to gauge if learning has
     taken place through actual application
• Establish a monitoring mechanism to measure
  impact of the training on the daily use of ICT among
  participants
Recommendations:
                       Resources
• Content customization
   – use of local language/s and sample cases
• Incorporate use of other ICT (e.g. cellphones, TV,
  digicam/videocam, etc.) in materials
• providing some Filipino-translated and dubbed versions of the
  KTCF videos can increase understanding and retention among
  the trainees
• Stand-alone modules on “Responsible Use of ICTs” can be
  provided to Filipinos who are not “zero-knowledge” in terms
  of ICT, but can stand to benefit from such instruction (i.e.
  students in all levels, etc.)
Other Recommendations
• Need for a stronger advocacy campaign on the
  “Responsible Use of ICT”
• Trainees should be given ample time to absorb
  lessons: providing some days off training in between
  modules to learn more things on their own and
  deepen their knowledge at their own time, in their
  own contexts, with assigned activities and outputs
• Try another run with KTCF training design as starting
  point (instead of the current CILC training design) to
  check its applicability in the Philippine setting
Recent Updates
• iSchools – another run in Bataan (parents) +
  request from DepEd-Bataan for roll-out
• eSkwela – training design to be recommended
  to eSkwela centers
• Digital Bridges - new implementations
  – 1 run with Government Executives (focus was
    more on copyright and security issues)
  – 1 run with Elderly
Project Outputs
Enhanced training design for each
type of CILC run (with different
target participants), supported by:
    3 Trainer’s Guidebooks            Version 1
    3 Trainee’s Manuals               Slides of Pilot
                                      implementations
   Pre-Training and Post-Training     For further study
   Assessment Tools for trainees
Online collaborative site             http://responsibleuseofict
                                      .wikispaces.com
Project Report                        To be submitted
eSkwela Training
Teacher showing the ADOC Trainee how to go about using the
Edubuntu Operating System and using the keyboard.
Responsible use of ICT excuses no one “young and old alike”.
End of presentation

More Related Content

What's hot

Interview presentation
Interview presentationInterview presentation
Interview presentation
Rosalindj26
 
CICT's ICT Month Celebrations - HCDG Week
CICT's ICT Month Celebrations - HCDG WeekCICT's ICT Month Celebrations - HCDG Week
CICT's ICT Month Celebrations - HCDG Week
Mel Tan
 
Optimizing Internet Freeware for ELT
Optimizing Internet Freeware for ELTOptimizing Internet Freeware for ELT
Optimizing Internet Freeware for ELT
Made Hery Santosa
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual Learning
eLearning Papers
 
The future of learning blended learning
The future of learning blended learning The future of learning blended learning
The future of learning blended learning
ydgs20
 
Pal gov.tutorial6.session2. ethical and social issues
Pal gov.tutorial6.session2. ethical and social issuesPal gov.tutorial6.session2. ethical and social issues
Pal gov.tutorial6.session2. ethical and social issues
Mustafa Jarrar
 

What's hot (20)

ISTE-NETS & IB ICT Learner Profile, A marriage made in Digital Heaven
ISTE-NETS & IB ICT Learner Profile, A marriage made in Digital HeavenISTE-NETS & IB ICT Learner Profile, A marriage made in Digital Heaven
ISTE-NETS & IB ICT Learner Profile, A marriage made in Digital Heaven
 
DeepNines CIPA Whitepaper
DeepNines CIPA WhitepaperDeepNines CIPA Whitepaper
DeepNines CIPA Whitepaper
 
Interview presentation
Interview presentationInterview presentation
Interview presentation
 
La4b multimedia notacd09
La4b multimedia notacd09La4b multimedia notacd09
La4b multimedia notacd09
 
CICT's ICT Month Celebrations - HCDG Week
CICT's ICT Month Celebrations - HCDG WeekCICT's ICT Month Celebrations - HCDG Week
CICT's ICT Month Celebrations - HCDG Week
 
Co creat presentation__Tommi Inkilä_150213
Co creat presentation__Tommi Inkilä_150213Co creat presentation__Tommi Inkilä_150213
Co creat presentation__Tommi Inkilä_150213
 
Optimizing Internet Freeware for ELT
Optimizing Internet Freeware for ELTOptimizing Internet Freeware for ELT
Optimizing Internet Freeware for ELT
 
Online assignment- Multimedia as a Technology Enhanced Communication Devices ...
Online assignment- Multimedia as a Technology Enhanced Communication Devices ...Online assignment- Multimedia as a Technology Enhanced Communication Devices ...
Online assignment- Multimedia as a Technology Enhanced Communication Devices ...
 
Indonesia ICT NewLetter October Edition - English Version
Indonesia ICT NewLetter October Edition - English VersionIndonesia ICT NewLetter October Edition - English Version
Indonesia ICT NewLetter October Edition - English Version
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual Learning
 
Overview on Smart City: Smart City for Beginners
Overview on Smart City: Smart City for BeginnersOverview on Smart City: Smart City for Beginners
Overview on Smart City: Smart City for Beginners
 
Brunel University
Brunel University Brunel University
Brunel University
 
Nist leaf pressclub_032911
Nist leaf pressclub_032911Nist leaf pressclub_032911
Nist leaf pressclub_032911
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learning
 
Et 502 assignment 1 susmita1
Et 502 assignment 1   susmita1Et 502 assignment 1   susmita1
Et 502 assignment 1 susmita1
 
The future of learning blended learning
The future of learning blended learning The future of learning blended learning
The future of learning blended learning
 
Pal gov.tutorial6.session2. ethical and social issues
Pal gov.tutorial6.session2. ethical and social issuesPal gov.tutorial6.session2. ethical and social issues
Pal gov.tutorial6.session2. ethical and social issues
 
Breaking
BreakingBreaking
Breaking
 
Agora panel johannes_magenheim
Agora panel johannes_magenheimAgora panel johannes_magenheim
Agora panel johannes_magenheim
 
Role of ICT in Education
Role of ICT in EducationRole of ICT in Education
Role of ICT in Education
 

Viewers also liked

General Capabilities ICT
General Capabilities ICTGeneral Capabilities ICT
General Capabilities ICT
beck222
 
A Pilot Study - What, Why, and How
A Pilot Study - What, Why, and HowA Pilot Study - What, Why, and How
A Pilot Study - What, Why, and How
Soleh Al Ayubi
 
incident analysis - procedure and approach
incident analysis - procedure and approachincident analysis - procedure and approach
incident analysis - procedure and approach
Derek Chang
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
 

Viewers also liked (20)

Tables for april 2015 release
Tables for april 2015 releaseTables for april 2015 release
Tables for april 2015 release
 
General Capabilities ICT
General Capabilities ICTGeneral Capabilities ICT
General Capabilities ICT
 
ICT Auditing
ICT AuditingICT Auditing
ICT Auditing
 
Magne retail deck
Magne retail deckMagne retail deck
Magne retail deck
 
getSayDo - how to run a pilot - brand management service
getSayDo - how to run a pilot - brand management servicegetSayDo - how to run a pilot - brand management service
getSayDo - how to run a pilot - brand management service
 
Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Colorado Cyber TTX attack AAR After Action Report ESF 18
Colorado Cyber TTX attack AAR After Action Report   ESF 18Colorado Cyber TTX attack AAR After Action Report   ESF 18
Colorado Cyber TTX attack AAR After Action Report ESF 18
 
The Importance Of After Action Reports
The Importance Of After Action ReportsThe Importance Of After Action Reports
The Importance Of After Action Reports
 
ExCeed Community Economic And Entrepreneurial Development
ExCeed Community Economic And Entrepreneurial DevelopmentExCeed Community Economic And Entrepreneurial Development
ExCeed Community Economic And Entrepreneurial Development
 
ICT in the Elementary School
ICT in the Elementary SchoolICT in the Elementary School
ICT in the Elementary School
 
Knowledge Management: leveraging NGO Resources
Knowledge Management: leveraging NGO Resources Knowledge Management: leveraging NGO Resources
Knowledge Management: leveraging NGO Resources
 
Gay co culture and communication
Gay co culture and communicationGay co culture and communication
Gay co culture and communication
 
A Pilot Study - What, Why, and How
A Pilot Study - What, Why, and HowA Pilot Study - What, Why, and How
A Pilot Study - What, Why, and How
 
incident analysis - procedure and approach
incident analysis - procedure and approachincident analysis - procedure and approach
incident analysis - procedure and approach
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Private pilot study guide
Private pilot study guidePrivate pilot study guide
Private pilot study guide
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Part 1 - Communications in Service of Extension
Part 1 - Communications in Service of ExtensionPart 1 - Communications in Service of Extension
Part 1 - Communications in Service of Extension
 

Similar to Responsible use of ict brief project report - feb 2011

Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wf
E Robertson
 
Implementing BYOT
Implementing BYOTImplementing BYOT
Implementing BYOT
ahdyal
 
Implementing BYOT
Implementing BYOTImplementing BYOT
Implementing BYOT
dyal1
 
20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts
Damir Delija
 
Employability for Connected TV
Employability for Connected TVEmployability for Connected TV
Employability for Connected TV
wired_sussex
 

Similar to Responsible use of ict brief project report - feb 2011 (20)

Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wf
 
Stucky Rwagasana Presentation
Stucky Rwagasana PresentationStucky Rwagasana Presentation
Stucky Rwagasana Presentation
 
Challenges and requirements for a next generation service for video content s...
Challenges and requirements for a next generation service for video content s...Challenges and requirements for a next generation service for video content s...
Challenges and requirements for a next generation service for video content s...
 
Implementing BYOT
Implementing BYOTImplementing BYOT
Implementing BYOT
 
Implementing BYOT
Implementing BYOTImplementing BYOT
Implementing BYOT
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
 
Piloting Mixed Reality in ICT Networking to Visualize Complex Theoretical Mul...
Piloting Mixed Reality in ICT Networking to Visualize Complex Theoretical Mul...Piloting Mixed Reality in ICT Networking to Visualize Complex Theoretical Mul...
Piloting Mixed Reality in ICT Networking to Visualize Complex Theoretical Mul...
 
Eyes of things
Eyes of thingsEyes of things
Eyes of things
 
SocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social InclusionSocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social Inclusion
 
20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts
 
Ict
IctIct
Ict
 
ict.pptx
ict.pptxict.pptx
ict.pptx
 
WCIT 2014 Robert Kahn - The Evolution of the Internet
WCIT 2014 Robert Kahn - The Evolution of the InternetWCIT 2014 Robert Kahn - The Evolution of the Internet
WCIT 2014 Robert Kahn - The Evolution of the Internet
 
Employability for Connected TV
Employability for Connected TVEmployability for Connected TV
Employability for Connected TV
 
ICT for VEC CIO
ICT for VEC CIOICT for VEC CIO
ICT for VEC CIO
 
UCISA 2013 Presentation
UCISA 2013 PresentationUCISA 2013 Presentation
UCISA 2013 Presentation
 
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
 
US Ignite: Fueling Innovationvia Gigabit Networks
US Ignite: Fueling Innovationvia Gigabit NetworksUS Ignite: Fueling Innovationvia Gigabit Networks
US Ignite: Fueling Innovationvia Gigabit Networks
 
ICTs for easy teaching
ICTs for easy teachingICTs for easy teaching
ICTs for easy teaching
 

More from Mel Tan

eSkwela end of-project booklet
eSkwela end of-project bookleteSkwela end of-project booklet
eSkwela end of-project booklet
Mel Tan
 
eSkwela end of-project booklet
eSkwela end of-project bookleteSkwela end of-project booklet
eSkwela end of-project booklet
Mel Tan
 
Rc brochure april 29, 2011
Rc brochure   april 29, 2011Rc brochure   april 29, 2011
Rc brochure april 29, 2011
Mel Tan
 
eSkwela end of-project booklet - 2 pages per sheet
eSkwela end of-project booklet - 2 pages per sheeteSkwela end of-project booklet - 2 pages per sheet
eSkwela end of-project booklet - 2 pages per sheet
Mel Tan
 
CRR pagadian-2
CRR pagadian-2CRR pagadian-2
CRR pagadian-2
Mel Tan
 
General Update Instructional Model
General Update   Instructional ModelGeneral Update   Instructional Model
General Update Instructional Model
Mel Tan
 
E Skwela & Ict4 E Brief
E Skwela & Ict4 E BriefE Skwela & Ict4 E Brief
E Skwela & Ict4 E Brief
Mel Tan
 
General Update Instructional Model
General Update   Instructional ModelGeneral Update   Instructional Model
General Update Instructional Model
Mel Tan
 
General Update Systems Devt
General Update   Systems DevtGeneral Update   Systems Devt
General Update Systems Devt
Mel Tan
 
Marketing & Communications
Marketing & CommunicationsMarketing & Communications
Marketing & Communications
Mel Tan
 
Action Planning Workshop
Action Planning WorkshopAction Planning Workshop
Action Planning Workshop
Mel Tan
 
E Skwela 2.0
E Skwela 2.0E Skwela 2.0
E Skwela 2.0
Mel Tan
 

More from Mel Tan (20)

eSkwela end of-project booklet
eSkwela end of-project bookleteSkwela end of-project booklet
eSkwela end of-project booklet
 
eSkwela end of-project booklet
eSkwela end of-project bookleteSkwela end of-project booklet
eSkwela end of-project booklet
 
Rc brochure april 29, 2011
Rc brochure   april 29, 2011Rc brochure   april 29, 2011
Rc brochure april 29, 2011
 
eSkwela end of-project booklet - 2 pages per sheet
eSkwela end of-project booklet - 2 pages per sheeteSkwela end of-project booklet - 2 pages per sheet
eSkwela end of-project booklet - 2 pages per sheet
 
eSkwela report - turnover ceremonies (29 April 2011)
eSkwela report  -  turnover ceremonies (29 April 2011)eSkwela report  -  turnover ceremonies (29 April 2011)
eSkwela report - turnover ceremonies (29 April 2011)
 
Dav 2
Dav 2Dav 2
Dav 2
 
Erick
ErickErick
Erick
 
Tito
TitoTito
Tito
 
Juris 2
Juris  2Juris  2
Juris 2
 
CRR pagadian-2
CRR pagadian-2CRR pagadian-2
CRR pagadian-2
 
Georly 2
Georly 2Georly 2
Georly 2
 
Brochure 2010-long
Brochure 2010-longBrochure 2010-long
Brochure 2010-long
 
Eskwela ict4e expo - june 2010
Eskwela   ict4e expo - june 2010Eskwela   ict4e expo - june 2010
Eskwela ict4e expo - june 2010
 
General Update Instructional Model
General Update   Instructional ModelGeneral Update   Instructional Model
General Update Instructional Model
 
E Skwela & Ict4 E Brief
E Skwela & Ict4 E BriefE Skwela & Ict4 E Brief
E Skwela & Ict4 E Brief
 
General Update Instructional Model
General Update   Instructional ModelGeneral Update   Instructional Model
General Update Instructional Model
 
General Update Systems Devt
General Update   Systems DevtGeneral Update   Systems Devt
General Update Systems Devt
 
Marketing & Communications
Marketing & CommunicationsMarketing & Communications
Marketing & Communications
 
Action Planning Workshop
Action Planning WorkshopAction Planning Workshop
Action Planning Workshop
 
E Skwela 2.0
E Skwela 2.0E Skwela 2.0
E Skwela 2.0
 

Recently uploaded

NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
zukhrafshabbir
 
ch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.pptch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.ppt
ZawadAmin2
 

Recently uploaded (20)

Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement CriteriaSedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdf
 
HAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsHAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future Prospects
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service Lightning
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdf
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE Ventures
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?
 
ch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.pptch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.ppt
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 

Responsible use of ict brief project report - feb 2011

  • 1. Pilot Run in the Philippines of the APEC Training Program for Preventive Education on ICT Misuse Brief Project Report 15 February 2010 http://responsibleuseofict.wikispaces.com
  • 2. APEC ICT Net Project • 2006-2007 by KTCF and AEF • a culture of healthy ICT use and adverse effects of ICT use • Activities: – research, content development – educational campaign through a poster competition – content localization and distribution through pilot use of the content in local training workshops (Peru and the Philippines)
  • 3. APEC Training Program for Preventive Education on ICT Misuse • KTCF and APWINC • enhancements on the previous training design and materials + training rollout • International Symposium on ‘Safe and Trusted ICT/ Internet Use, Actions Against Internet Misuse’ in September 2009 • Training workshops – Philippines & Indonesia
  • 4. Responsible Use of ICT • Pilot Philippine run • Commission on Information and Communications Technology and Svillupo Consulting Services Cooperative • Enhancement of CICT’s existing Computer and Internet Literacy Course (CILC) by incorporating KTCF materials
  • 5. Responsible Use of ICT Regular CILC run Special CILC run •5 days •3 days •Topics covered: •Topics covered: • ICT Basics (includes Proper • ICT Basics Use of Computers) • Internet • Internet • Responsible Use of ICT • Word Processing (combination of proper use • Spreadsheet of computers, Cyber • Multimedia Presentation Security and Ethics) • Cyber Security and Ethics •Materials: •Materials: • Combination of regular • Locally developed CILC run materials + • Web-based videos/photos selected appropriate KTCF • Games, activities videos & activities
  • 6. Responsible Use of ICT • Involved groups: – iSchools Project – 5 trainers – eSkwela Project – 5 trainers – Digital Bridges Program – 4 trainers – CILC(7) e-module reviewers (eSkwela) – 2 • Contracted an external Master Trainer • Target end-user participants: zero- ICT knowledge/skills
  • 7. Activities activity objective Date & venue Participants Training of Trainers To come up with the respective 3-day Dec 9-11, 2009 16 trainers end-user training workshop design Mimosa Project team and plan for the end-user training KTCF implementation End-user Training - To train zero-ICT knowledge/skills Jan 18-21, 2010 20 elementary iSchools participants on the responsible use BPSU-Orani teachers-DepEd- of ICT Orani Topics: End-user Training - •ICT Basics Jan 18-21, 2010 20 out-of-school eSkwela •Internet eSkwela-Telof QC youth and adults •Responsible Use of ICT from 3 Quezon City areas End-user Training - Jan 18-21, 2010 20 community Digital Bridges ADOC Lab, CICT leaders & volunteers from 4 ADOC areas Debriefing To evaluate the training program Jan 22-23, 2010 16 trainers (experiences, challenges, lessons Seminar Rm, CICT Project team learned, good practices) and provide KTCF recommendations for next steps
  • 8. Highlights: Training of Trainers Topics covered 1. Basic Project Planning 2. Profile of a Novice ICT User 3. Characteristics of a Responsible ICT User 4. Review of KTCF Materials (for possible incorporation into own training designs) 5. Creating the Responsible Use Agreement 6. Creating the Competency-Strategy-Material Framework 7. Creating the Training Design
  • 9. Feedback from the Participants (Trainers) on the ToT • Appreciated lectures/inputs from the 3 Korean professors – Internet, Game and Pornography Addiction – Legal System to protect IPR – Netiquette – Comparison of Korean experience with local status/context • 2 ½ days for the ToT is too short • Teams were adequately prepared in planning for their EUTs • Customization of their training designs was imperative due to dissimilar target clients
  • 10. Highlights: End-User Training iSchools • Participants: 28 years to 45 years old (teachers) • Used most (if not all) of the KTCF videos provided – use of animation as a means to convey lessons much more than presentations per se • Use of personal stories and situations; role-playing eSkwela • Participants: 14 years to 52 years old (out-of-school youth / adults) • Medium of instruction: Filipino • Use of analogies, local cases, and physical activities instead of immersing the learners immediately into the technology • Incorporated the module on Preventing VDT Syndrome into their icebreakers and warm-up exercises to instill the habit or proper posture and exercises in the learners • Workshop on setting rules for responsible ICT use • used most if not all KTCF videos Digital • Participants: 18 years to 67 years old (community leaders/volunteers); majority were zero-knowledge/skill ICT users with technophobia (i.e. wary of powering Bridges the computer on/off and clicking the mouse) • Group work on different cyber crimes (how to solve and come up with a set of computer ethics or netiquette) – Strategy: Video – Process – Lecture use of videos, small group discussion, plenary presentation
  • 11. KTCF Resources/Activities Used Topics covered iSchools eSkwela Digital Bridges ICT Basics • ICT concepts • Video: VDT Syndrome • Use of Computer • Icebreaker: VDT exercises components • Labeling the parts of the • Accessing Software computer (input & output • File Management devices) • Some KTCF slides Internet • Communication tools: • Video & Slides: Two • Thread Connection • Video: email, instant Faces of the Internet, • Passing the Message Protecting messaging • Video & Activity: Two Personal • Browser use/ Search Faces of the Internet, Information, Engine Protecting Personal • eCommerce, Information entertainment, social • KTCF slides: Internet networking Suppliers and Consumers Responsible • Proper Use • Slides: games, internet • KTCF slides • Videos: • Benefits and issues addiction, Cyber bullying, • Videos: • Copyright Use of ICT concerning ICT use netiquette • Netiquette Protection • Cybercrimes • Videos: • Verbal Violence • Phishing Scam • Copyright Protection • Internet Addiction • Pornography • VDT Syndrome • Pornography Addiction Addiction • Provision of False • Game Addiction Information • Mobile Phone Addiction • Mobile Phone Manners • Copyright Protection • Cyber Security • Self-control in Watching • Malware Indecent Contents • Account Compromise • Confusion Between Cyberspace and Reality • Phishing • Production and Distribution of Viruses
  • 12. Feedback from the Trainers on the EUT • All of the sessions were found to be useful to the participants • Session or Module 1 is the most challenging because it all starts from there • There should always be an activity related to the topics before starting the lectures to better understand the lessons. • Training materials: Should not be too technical, participants might not understand fully what is in the training materials • Device a way on how to measures the knowledge being imparted by the trainers, probably an exam 4 to 5 questions on the previous lectures before proceeding to the next lectures.
  • 13. Feedback from the Participants on the EUT • “APEC” label: very much appreciated • KTCF videos would be better understood if they were dubbed in Filipino and had Filipino subtitles • 3-day exposure/training is too short; need for follow-up sessions • Fear: to lose what they learned because they do not have constant and frequent access to ICTs to practice what they learned • Thankful for the opportunity and the allowances
  • 14. Highlights: Debriefing • After Action Review – project’s goals – what happened – factors that accounted for differences in planning vs. execution – improvements for the next run. • Documenting the EUT. – answers to the four AAR questions – modified Training Design – Trainer’s Guidebook – Training Report
  • 15. General Observations • Responsible Use of ICT is necessary • KTCF materials are useful – Better if dubbed in Filipino – Flexible use: welcomed • Customization is necessary (training designs and materials) • Team teaching works! • Fast Internet connection during training runs is crucial • Wiki habit not ingrained
  • 16. Challenges • Technical problems – Slow and/or intermittent internet connection – No printer was available for printer-related exercises – Available computers could not play KTCF videos • Coordination gaps with the participants in terms of schedule • Participants had difficulty understanding some of the resource materials because these were in English. • None of the project teams reported successfully carrying out the activity on creating laboratory policies or responsible use agreements. • Training participants took longer than expected to grasp basic concepts – training teams had to adjust accordingly
  • 17. Recommendations: Training Design • Training objectives must consider the following: – ICT know-how of trainees – Available time/duration – Available resources, particularly infrastructure • Rollout and further tweaking – Longer training period for participants with zero-ICT knowledge/skills • a two-(or even three-) part workshop is desirable to attain learning for a “zero-knowledge” ICT trainee to a responsible ICT user
  • 18. Recommendations: Training Pre-requisites • Training on responsible use of ICT might be better discussed among Level 2 users in a follow-up workshop (after a few weeks) – rather than to Level 1 zero-knowledge/skills who are just starting to appreciating ICT use
  • 19. Recommendations: Training Strategies • use Filipino context and actual situations • Using a form of – pre-assessment prior to training to establish the true level of ICT knowledge of the trainees – post-assessment after training (immediately as well as after 3 months) to gauge if learning has taken place through actual application • Establish a monitoring mechanism to measure impact of the training on the daily use of ICT among participants
  • 20. Recommendations: Resources • Content customization – use of local language/s and sample cases • Incorporate use of other ICT (e.g. cellphones, TV, digicam/videocam, etc.) in materials • providing some Filipino-translated and dubbed versions of the KTCF videos can increase understanding and retention among the trainees • Stand-alone modules on “Responsible Use of ICTs” can be provided to Filipinos who are not “zero-knowledge” in terms of ICT, but can stand to benefit from such instruction (i.e. students in all levels, etc.)
  • 21. Other Recommendations • Need for a stronger advocacy campaign on the “Responsible Use of ICT” • Trainees should be given ample time to absorb lessons: providing some days off training in between modules to learn more things on their own and deepen their knowledge at their own time, in their own contexts, with assigned activities and outputs • Try another run with KTCF training design as starting point (instead of the current CILC training design) to check its applicability in the Philippine setting
  • 22. Recent Updates • iSchools – another run in Bataan (parents) + request from DepEd-Bataan for roll-out • eSkwela – training design to be recommended to eSkwela centers • Digital Bridges - new implementations – 1 run with Government Executives (focus was more on copyright and security issues) – 1 run with Elderly
  • 23. Project Outputs Enhanced training design for each type of CILC run (with different target participants), supported by: 3 Trainer’s Guidebooks Version 1 3 Trainee’s Manuals Slides of Pilot implementations Pre-Training and Post-Training For further study Assessment Tools for trainees Online collaborative site http://responsibleuseofict .wikispaces.com Project Report To be submitted
  • 25. Teacher showing the ADOC Trainee how to go about using the Edubuntu Operating System and using the keyboard.
  • 26. Responsible use of ICT excuses no one “young and old alike”.