Module 2 Notes
Module 2 Notes
Global Issues
Access and Civil Liberties are two sets of issues in ICT Policy which are crucial
to the modern society. The other concern is civil liberties which refer to human
rights and freedom. These include:
Freedom of expression
The right to privacy,
The right to communicate
Intellectual property rights.
Access to the Use of Internet and ICT. Access means the possibility for
everyone to use the internet and other media.
Issue # 1. Freedom of Expression and Censorship
Under international human rights conventions, all people are guaranteed the
rights for free expression.
The UN Universal Declaration of Human Rights provides that everyone has the
right to freedom of thought, conscience and religion, likewise the right to freedom of
opinion and expression.
Censorships restricts the transmission of information by blocking it or filtering
the information. Blocking is preventing access to whole areas of internet upon the
blacklist of certain Internet address. Filtering is sifting the packets of data or
messages as they move across computer networks and eliminating those considered
“undesirable” materials. Defamation actions may be used to silence critics. This action
deters the freedom of expression (Bilbao, et al., 2019).
Issue # 2. Privacy and Security
Privacy policies are an issue. Most controversial sites have a privacy policy. When
someone uses a site and clicks “I agree” button, it is as if you have turned over private
information to any authority that may access it.
Privacy means “personal privacy” the right of individuals not to have their
home, private life or personal life interfered with. Privacy of communication refers
to the protection from interference with communication over the phone or internet.
Information privacy is related to the use of computers and communications system
which are able to hold and process information about a large numbers of people at a
high speed (Bilbao, et al., 2019).
Issue # 3. Surveillance and Data Retention
The use of electronic communications has enhanced the development of indirect
surveillance. In the indirect surveillance, there is no direct contact between the agent
and the subject of surveillance but evidence of activities can be traced. The new and
powerful form of indirect surveillance is dataveillance.
Dataveillance is the use of personal information to monitor a person’s activities
while data retention is the storage use of information from communication systems.
Issue # 4. E-pollutants from E-waste
Large amount of e-waste is generated by ICT. There are in particular, terminal
equipment used for computing (PCs, laptops), broadcasting (television and radio sets),
telephony (fixed and mobile phones), and peripherals (fax machines, printers and
scanners).
If not controlled then, e-waste will tremendously affect climate change, damage human
lives, and overload the capacity of the earth in carrying solid waste.
Implications to teaching and learning (for teachers and learners):
Guide the mentors on what they should teach and relate to ICT, and how to
teach it.
Technology should never replace any human teacher.
Rules and regulations govern the use of technology.
Each teacher will be encouraged to use technology in teaching.
Learners need guidance on how to use and regulate the use of technology.
Learners should take advantage of the benefits derived from the use of
technology.
Mentors and learners should be mindful of the e-waste that are being thrown
away to the land and to the atmosphere.
Safety Issues on the Use of ICT
Including e-Safety Rules
Some Risks in the Use of ICT and e-Networking (Bilbao, et al., 2019):
Safeguard and protection should be the primary roles of teachers, parents,
schools and the community…
Exposure to inappropriate content, including on-line pornography, extremism
(exposure to violence associated with racist language)
Lifestyle websites like self-harms and suicide cites, and hate cites
Cyberbullying in all forms, receiving sexually explicit images or messages
Privacy issues including disclosures of personal information
Health and well-being (amount of time spent on-line, internet gaming and many
more)
Prolonged exposure to online technologies, particularly at early stage
Addiction to gambling and gaming
Theft and fraud from activities such as phishing
Viruses, Trojans, spyware and other malware
Social pressure to maintain online networks via texting and social networking
sites.
Minor Misuse of ICT (for students)
Copying information into assignment and failing to acknowledge the source
(plagiarism and copyright infringement)
Downloading materials not relevant to the topic/subject matter
Misconduct associated with subject logins, such as using someone else’s
password
Leaving a mobile phone turned on during class period or playing cellphones
during the class
Unauthorized taking of pictures or images with mobile phone camera, still or
moving
E-Safety
Source:http://www.ictinschools.org/e-safety/