Prof Ed7 Handouts2
Prof Ed7 Handouts2
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518
NAME: ________________________________________________________________
YEAR/COURSE:
_________________________________________________________
INSTRUCTOR___________________________________________________________
INTRODUCTION
Globalization is a reality and ICT has become a fundamental part of the process. A
networked society is one in which the entire planet is organized around telecommunicated
networks of computers. The powerful use of network use of network has broken boundaries,
provided opportunities for inclusion and collaboration.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518
One way of enhancing and regulating the use of ICT is to formulate and implement policies
to guide appropriate decisions.
Definition of ICT Policy
The Oxford English Dictionary has defined "policy" as a course of action, adopted and
pursued by a government, party, ruler, statesman. It is any course of action adopted as
expedient or advantageous. Its operational definition of policy is a plan of action to guide
decisions and achieve outcomes.
Thus, ICT Policies are needed to put a roadmap or course of actions to be pursued and
adopted by various governments, organizations, entities involving ICT. These include principles
and guidelines in the use of ICT which cover three main areas: telecommunications (telephone),
broadcasting (radio and television) and Internet.
The New ICT Technologies
More recent technological innovations increased the reach and speed of communications
which can be grouped into three categories:
1. Information Technology includes the use of computers, which has become indispensable in
modern societies to process data and save time and effort. What are needed will be computer
hardware and peripherals, software and for the user, computer literacy.
2. Telecommunication technologies - include telephones (with fax) and the broadcasting of radio
and television often through satellites. Telephone system, radio and TV broadcasting are needed
in this category.
3. Networking technologies The best known of networking technologies is Internet, but has
extended to mobile phone technology, Voice Over Internet Protocol (VOIP) satellite
communications and other forms of communications are still in their infancy. In addition to
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518
Internet, this category also includes mobile telephone, cable. DSL, satellite and other broadband
connectivity.
Infringement to Civil Liberties or Human Rights. What are specific internet issues on
internet policy that have relationship to civil liberties or human rights? Let's study the examples
that follow.
Issue No. 1: Freedom of Expression and Censorship
Under international human rights conventions, all people are guaranteed the rights for
free expression. However, with the shift from communicating through letter, newspapers and
public meetings to electronic communications and on-line networking, a need to look into how
these new means modifies the understanding of freedom of expression and censorship.
The UN Universal Declaration of Human Rights provides that everyone has the right to freedom
of thought, conscience and religion, likewise the right to freedom of opinion and expression.
However, there are practices that violate these provisions in the use of internet. Some examples
are the following:
1. Individual rights are given up in order to have access to electronic networks. Microsoft
Network's (MSN's contracts provide protection of individuals like "upload, or otherwise make
available files that contain images, photographs or other materials protected by intellectual
property laws, including but not limiting to copyright or trademark laws, unless you own or
control the rights thereto or have received all necessary consents to do the same." However,
Microsoft reserves the rights, in its sole discretion, to terminate access to any or all MSN sites or
services.
2. Censorship restricts the transmission of information by blocking it or filtering the information.
Blocking is preventing access to whole areas of internet based upon the "blacklist" of certain
Internet address, location or email addresses while filtering is sifting the packets of data or
messages as they move across computer networks and eliminating those considered
"undesirable" materials. The selection of sites that are blocked or filtered has been considered as
an issue.
Warning!!!!
When you are surfing the web, you may think you are anonymous, but there are various ways
that information about you or your activities can be collected without your consent.
3. Defamation actions may be used to silence critics. This action deters the freedom of
expression.
subject of surveillance but evidence of activities can be traced. The new and powerful form of
indirect surveillance is dataveillance. Dataveillance is the use of personal information to
monitor a person's activities while data retention is the storage and use of information from
communication systems.
There is very little that can be done to prevent surveillance. What can be done is to
change the methods of working to make surveillance difficult. This is called "counter
surveillance" or "information security" if it refers to computers and electronic communication.
Issue No. 4: E-pollutants from E-waste
Large amount of e-waste is generated by ICT. These are in particular, terminal
equipment’s used for computing (PCs, laptops), broadcasting (television and radio sets),
telephony (fixed and mobile phones), and peripherals (fax machines, printers and scanners).
The accumulated e-waste is due to rapid turnover of equipment due to rapid improvement
of software. While material waste can be destroyed by crushing, toxic material brought about by
the different equipment requires utmost management. The quantities of e-waste are increasing
in both developed and developing countries. A very dismal state is that there is a significant
amount of electronic waste that has been shipped from industrial countries to developing
countries, using less environmentally- responsible procedure.
Remedies include standardization and regulatory measures to increase the life cycle of
equipment before they become obsolete. Efficient extraction of toxic components and requiring
the recycling by both consumers and equipment vendors are selling must be required.
If not controlled then, e-waste will tremendously affect climate change, damage human
lives, and overload the capacity of the earth in carrying solid waste.
Learners should not only know the benefits of technology use, but they should also know
how they can be protected from the hazards that technology brings to their lives. Learners
should take advantage of the potential of learning support they can derive such as the
development of higher order thinking skills, the development of learning communities through
collaboration, the enhancement of skills to manage the vast resources as 21" century learners
and many more.
Both the teachers and learners should be mindful of the e-waste that are being thrown
away to the land and to the atmosphere. Thus, safety in the use of technology shall be presented
in the next lesson.
Assume yourself as an investigator who would like to inform your learner and co-
teachers about the current issues on technology issues. Choose only one article that
you will work on. Use the template below to answer.
Search the web and find out articles or cases about:
Freedom of Expression and Censorship
Privacy and Security
Surveillance and Data Retention
E-pollutants from e-waste
Summary Narrative:
Network Management
1. Safety in the Use of Network in Schools
1.1. Make clear that no one should log on as another user.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518
1.2. Require all users to always log off when they have finished working.
1.3. Maintain equipment to ensure health and safety.
1.4. Provide students with access to content and resources through guided e-learning.
1.5. Set up a clear disaster recovery system in place for critical data that include secure, remote
back up of critical data. 1.6. Secure wireless network to appropriate standards suitable for
educational Use.
1.7. Install all computer equipment professionally and meet health and safety standards,
1.8 Review the school ICT system regularity with regard to health and safety and security.
2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to disclose
their passwords unless they got permission from the owner or from the management. The
equipment that keeps the personal information shall be locked when unattended to prevent
unauthorized access. Computers should be set to a time out if they become unused for a certain
period of time.
3. Personal mobile phones and mobile devices
3.1 All mobile phones shall be kept away in a box away from the children or learners and
access is only allowed at break time or at the end of classes or when needed during the class
period.
4. Cameras
4.1. Taking pictures only from parents or caregivers and not from any other family member or
friend while the child attends class.
4.2. Any picture taken of children shall be on cameras solely for the purpose.
Learning nowadays is viewed differently. The present generation of learners has access to
information at their fingertips. The teacher is no longer seen as basically the dispenser of
knowledge but rather as one who expertly directs the learners to take their own track in
searching for answers to questions raised inside the classroom. Then they bring these back to
the class for further discussion until perhaps resolutions are agreed. They can search the web
and discover a breadth of information related to the lesson. They even have the patience to stay
in front of the computer for an unusually longer time in search for more articles and multimedia
materials that simplify a challenging topic. That is why they can sometimes learn more than
what is confined in the four corners of the classroom.
Every chance or corner becomes a learning space. It is clear that learning takes place
anywhere and this adds to the concept of flexibility in the learning environment. With
technology, students can possibly continue to join class sessions even if they are not physically
around. The learning space becomes virtual or mediated. The library is not only a physical
structure where they can read published books but has also become virtual.
Online Distance Learning
Online distance learning is not a new concept. Some schools, higher education institutions
in the country, and educational agencies such as the Southeast Asian Ministers of Education
Innovations in Educational Technology (SEAMEO- INNOTECH) provide this mode of learning. It
allows flexibility in learning to certain extent.
The Different Platforms
The flexible mode of learning uses a platform such as moodle, Google classroom,
edmodo, schoology, etc. These are free programs designed for educational purposes. It has
features that are patterned after the instructional activities of a teacher in
physical classroom.
Moodle
Moodle was created by Martin Dougiamas, founder and CEO of Moodle.
MOODLE stands for Module Object Oriented Dynamic Learning
Environment which is an open source software.
It is a Learning Management System (LMS) that supports teaching and
learning.
Schoology
Schools is another LMS founded in 2009 by Jeremy Friedman, Ryan Hwang, Tim Trinidad
and Bill Kindler.
MOOCs
Massive Open Online Course (MOOCs)
It is a model for delivering learning content online to any person who wants to take a
course. It allows one to pursue learning even outside of university or higher education
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518
formal structure. Those who are working can enroll in MOOCS with a limit on attendance.
As long as you are willing to learn, you can engage in an area of discipline and learn. It
allows interconnectedness among people in the world to discuss and share recent
developments in their common field of interest.
EDUCAUSE is a nonprofit association with the mission is to advance higher education
through the use of information technology. The link herein provides a sucCinct video
explaining about MOOCs, (Please view URL: https://1ibrary. cducause edutopics/teaching-
and-learning/massive-open-online-course-mooc.)
Blended Learning
Another way of handling flexible learning is by combining modalities of instructional
delivery. Blended learning is a combination of a learning activities wherein a part of the lesson is
delivered online while the other part is handled in actual physical setting of a classroom.
Kinds of Blended Learning
1. Model 1: Face-to-Face Driver
In the face-to-face model, the teacher delivers the curricula most of the time and utilizes
online learning at certain times with the purpose to augment or provide an alternative
experience. Instruction is provided in a computer laboratory or assigned tasks are uploaded
online.
2. Model 2: Rotation
In a particular course or subject, students rotate on a fixed schedule between learning
online in a one-to-one, self-paced learning environment and being inside the classroom with a
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518
face-to-face teacher. This is the model that is in between the traditional face-to-face learning and
online learning,
3. Model 3: Flex
This model uses an online platform that delivers most of the course. Support to learning is
provided as needed through on-site support or by an online tutor who facilitates the tutorial or
small group sessions. Sessions can be arranged into synchronous or asynchronous. Course
participants may work on their tasks at any convenient time as long as it is within the confines of
the course duration.
4. Model 4: Online Lab
The online-lab model uses an online platform in delivering the course but located in a
physical classroom or computer laboratory. Since the lessons are in modular format and
available in the online program, teacher assistants supervise these classes. However, they may
not provide the needed expertise if learners seek assistance. Furthermore, students who are
enrolled in an Online Lab model of blended learning may be enrolled in a traditional classroom
courses at the same time and therefore have block schedules.
5. Model 5: Self-Blend
The self-blend Model is a system provided by the school where the students can choose
the courses they would like to have in addition to their typical brick-and-mortar classroom
classes. This model is always remote-a major difference from the Online Lab
They say that there is a great need to connect because whom one knows matters.
Sometimes one needs to link with them because they have what one needs. However, the
challenge is how to shift the network from people who can provide the favors into establishing
the relationship that will entitle him or her to be called 'a friend', one who can be trusted as a
collaborator in working on an assigned task by the teacher.
Social Networking Platforms
Different ways to communicate with friends can be through the internet or mobile devices.
One can have a personal page where a profile can be built in a social networking site. Through
this site, one can contact friends or share resources and interests. Communication through a
chat format can either be one- on-one or in a group. Topics being discussed can be posted and
made known therefore read by many or it can be discreet through a direct chat - a feature
allowing one to have a certain privacy on matters considered as such.
Social networking services have been evolving for more than a decade. Initially these
social networking services allowed users to construct their personal profile so that other contacts
may know the relevant information about them. At present, these have now evolved to sharing
of multimedia resources. Even having immediate and direct contact with friends in real time is
easily accessible through these sites.
There are varied platforms available where one can create a personal account. Some of
these popular social networking sites include Facebook, MySpace, Twitter, Elicker, Youtube, and
Linkedln among others.
Facebook
apparently is the biggest social networking site founded in 2004 based in Menlo Park, California.
The most popular social network apparently is Facebook. Used by most people, it allows users to
post their profile, blogs, pictures and videos.
Facebook lets one share status updates, news articles with friends and family. Although it started
as a way for college students to connect and socialize, it expanded its services allowing people
ages 13 and up to use a Facebook account for personal or even business reasons.
Twitter
does not only provide social networking service but it also gives online news. Breaking news has
taken a new twist with this social network website. Friends or colleagues may tell that they saw the
breaking news on Twitter.
Twitter is the site where users post and interact with messages called "tweets," restricted only to
140 characters. Only registered users can post tweets, but those who are not can only read them.
One of the main features of Twitter is it enables people to post their thoughts immediately.
Founded in 2006, Twitter is based in San Francisco, California, United States.
LinkedIn
is another social networking website for work.
When one has contacts, LinkedIn helps one is trying to find a job and may not contain one's resume
for potential search for career connections. It may employers to see.
The website lets one upload his educational qualifications, skills, work history, and relevant
experiences. One's connections can even endorse and this helps employers who can message the
one concerned and talk about the possibility of employment. Launched in 2003, this is a popular
social site in the 8 professional world.
Google +
is designed to be a total communication social network. Launched in 2011.
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518
Google is its parent and it is more advantageous if it is kept as a browser for users are connected
even If they are outside Google site.
Users can make friends and remained up to date with old friends without leaving their Gmail
account.
To distinguish connection, Google+ creates circles and the four standard circles refer to friends,
family, acquaintances and those being followed. Users can actually create as many circles as
they intend.
Youtube
is an American video-sharing website where users can upload, view, and even share video clips or
multimedia productions? It is a You Tube free social network site to join and use. Since it is owned
by Google, YouTube prefers a Google account to make it easier and streamlined. Some people think
that YouTube is not a social network.
It is such as it allows the users to share personal videos, view other uploaded multimedia clips and
make connections with friends and acquaintances. Just like with other social networking sites, users
can either make their videos private or public. Based in San Bruno, California, the service was
created in February 2005.
Pinterest
Pinterest is another social media tool that like YouTube, is often thought of as otherwise.
was designed as a catalogue of ideas or project ideas by its founder Ben Silberman. This is an
excellent choice for those who have a passion for creativity. Users must have an account to use
Pinterest. An email account or a Facebook account can be used in signing up to Pinterest, and if
users will use Facebook, their wall would be ready to post pins without linking with Facebook.
Instagram
is a platform where users share visual stories. This system allows users to post photos with captions
allowing followers to like or comment on one's posts. Photos shared have a wide range of coverage
- trips, food, business products. Since the site is free, advertisers can use Instagram to reach a wide
and are follower base.
Instagram account can be private or made public.
It is the best social networking site for photography.
Tumblr
is a networking site that combines social media and tumblr. blogging. Its main goal is to simplify
social media and blogging. Users can post whatever they like such as photos, videos, quotes,
music, links.
This is a social media that makes it very easy and straight forward to search just about anything.
MySpace
is another popular social networking website where members can make friends, post blogs and
photos, videos. It was acquired by Specific Media in 2011 and based in Beverly Hills California.
Myspace had its dose of crisis but came back stronger and rebranded to focus on music. Personal
users can use MySpace to keep up with their favorite artists, have an update on the music industry,
see what their friends are listening to, and connect with people who have similar music
preferences. It is a fitting social networking website for music.
is a social networking website with the backronym "Blog Early, Blog Often". It was invented to
answer the question what the name meant. It was founded by husband-and-wife team Michel and
Xochi Birch in January 2005 at their home in San Francisco.
With the fast development and vast coverage of innovations that address the mediated
communicative needs in the virtual reality, it is expected that there will be ore interactive features
of social networking sites that will be readily available for the users in the upcoming days.
1. A social networking account has passwords and log-in details. Secure passwords and keep
them private.
2. Log out every time you use public computers.
3. Regularly check privacy settings of social networking websites so that only direct friends or
those particularly known can see the posts.
4. Online posts are saved and may become a permanent part of their online reputation. As you
use the internet, you leave a digital footprint which can be traced back to you.
5. Do not accept invites from contacts unless you know them personally or you are sure of their
identity.
6. Seriously consider the effect of possible posts on others before deciding to do so. If posts (i.e.
text, picture, video) could be considered offensive or humiliating another person, then you
refrain from posting or uploading it.
7. Using appropriate language is essential. The tone when communicating or sending social
networking messages should be respectful.
8. Better be safe than sorry. You should accent friends and connections when you are sure of the
person's identity. Personally meeting someone you only met online is discouraged. Even if the
sincerity of having a personal meeting looks convincing, it would be better if you I will be
accompanied.
9. When there is an indication of harassment or abuse, it is advised that you report this by
clicking the report button of abuse. It is better still to talk to friends or trusted adults about the
case.
10. Bullying takes place even in social networking websites. Cyberbullying updates, and other
functions to harass, uses the site's messages, intimidate, humiliate, taunt. or pick on the
individual. When this happens, you can do the following actions:
a. ignores the behavior by not responding at all:
b. blocks the person;
c. clicks the report button of abuse; or
d. talk to a trustworthy adult about it.
Connecting with friends and having an active life on social networking websites have its
rewards. However, when one is not taking precautionary steps, there is also imminent danger. It
is more beneficial if you understand both its potential and its pitfalls. When used properly and in
the right measure, it can bring more benefits. Only then can social networking sites lead to one's
growth and ensure a productive social life.
Discuss how you will respond to this situation. Think of the best advice you learn.
Situation 1: Meeting someone in person you met online.
A classmate met somebody online and was asked her phone number and address. She confides
in you and you notice that she seems to have been hooked in chatting with this friend. You know
that there is a possibility that she will be invited for a personal meeting. What advice would you
give?
SOUTHWESTERN INSTITUTE OF BUSINESS AND TECHNOLOGY, INC.
DISCIPLINE…ACCOUNTABILITY…PROFESSIONALISM…HUMILITY
NAUTICAL HIGHWAY, PANGGULAYAN, PINAMALAYAN, ORIENTAL MINDORO
Contact Nos.: +63917-127-8500 | +63912-448-6518
Situation 2: Your best friend and you do not seem to like a group of classmates. You were asked
to take pictures of them in a school activity and since you have the file, your best friend chided
vou to distort their picture and post it on the internet. What should you do?
Prepared by:
Ms. Mialyn Concha,
LPT