TTL 2 Notes
TTL 2 Notes
COURSE DESCRIPTION
TTL 2 is a3 – unit course which will focus on the applications, design, production, utilization, and
evaluation of information and communications Technology (ICT) materials for teaching and learning
in Science Education Programs. The major requirements for this course are an ICT-integrated and
project-based learning plan aligned to the K to 12 curriculums. All the learning activities and course
requirements will revolve around the student-teacher development learning plan.
GENERAL OBJECTIVES
1. Explained the ICT Competency Standards for Teachers and the Roles of Technology for Teaching and
Learning
2. Explained ICT policies and safety issues as they impact on teaching-learning process
3. Described a flexible learning environment and the different platforms used for flexible learning
4. Developed and used the non-digital and digital tools in delivering technology-enhanced lessons
5. Applied the learning theories and principles related to media and technologies as these apply to the
design and development of lessons
6. Formulated teaching-learning experiences and assessment tasks using appropriate and innovative
technologies
7. Demonstrated socio-civic, ethical, and legal responsibilities in the use of technology tools and resources
CREDIT: 3 units
Antique's Pride
Antique's Pride
At the end of the unit, the students must have:
1. Identified the competency standards of ICT for teaching and learning in pre-service teacher
education
2. Unpacked the basic concepts of ICT to provide common understanding for teachers and learners
3. Valued the use of ICT in the teaching and learning processes
LESSON I
ICT COMPETENCY STANDARDS FOR PHILIPPINE
PRE-SERVICE TEACHER EDUCATION
Introduction
In this digital era, ICT use in the classroom is important for giving students opportunities to learn and
apply the required 21st century skills. Hence studying the issues and challenges related to ICT use in
teaching and learning can assist teachers in overcoming the obstacles and become successful technology
users. (Ghavifekr, et. al)
Antique's Pride
ICT Competency Standards (CHED-UNESCO) as provided in the 2017,
Policy, Standards and Guidelines (PSG) for Pre-service Teacher Education
ICT Competency Standards (CHED- UNESCO) as provided in the 2017, Policy, Standards and
Guidelines (PSG) for Pre-Service Teacher Education “demonstrate proficiency in the development
and utilization of Information, Communication and Technology (ICT) resources in promoting
quality teaching-learning process.
Domain 3: Pedagogy
3.1. Apply relevant technology tools for classroom activities
3.2. Use ICT knowledge to solve complex problems and support students’ collaborative activities
3.3. Model collaborative knowledge construction in face to face and virtual environment.
Antique's Pride
Domain 7: Teacher disposition
7.1 Demonstrate Social, Ethical, and legal responsibility in the use of technology tools and resources.
7.2 Shows positive attitude towards the use of technology tools.
DepEd Order 42, s. 2017 “show skills in the selection, development and use of the variety of teaching
learning resources including ICT to address learning goals.”
Antique's Pride
TEST YOURSELF!
1. The ICT Competency standards for teachers include all of the following EXCEPT
one. Which one?
a. Digital and Non-digital technology b. Enhance financial literacy skills
c. Ethical issues on the use of ICT d. Use of technology tools
3. The use of technology will enhance the 21st century skills along.
I. Development of tools
II. Critical thinking and problem solving
III. Designing learning environment and spaces
IV. All of the above
a. I only b. II only c. I, II and III d. IV only
4. A universal standard in the use of ICT in teaching and learning in the classroom
requires all teachers to __________ EXCEPT one.
a. Use gadgets when teaching b. Understand the issues and safety policies
c. Utilize the tools available in the environment d. Buy an expensive computer
Congratulations on the job well done. You can now proceed to the next
lesson ― Understanding the Basic Concepts in ICT.
Antique's Pride
LESSON II
Understanding the Basic Concepts in ICT
Introduction
The history of the world is full of technological breakthroughs arising from new scientific discoveries
and technological innovations. What started out as a painfully slow process of discovery, invention,
innovation, and obsolescence has been replaced by what seems to be in permanent flux as one
development is superseded by another at breath taking rates. For instance, with the passing of time,
man’s ways of recording data and his manner of writing has to put it mildly, improved – from carvings
images on stone and then later, writing characteristics with ink onto paper and more recently,
encoding in practically weightless and intangible cyberspace.
Technology as defined by John W. Hill (1975), is the “sum total of the processes by which we modify the
materials of nature to better satisfy our needs and wants.” Technology, therefore, is the technical know-
how that results in the production of machines and gadgets that in turn often results in more ways and
means of gathering and analyzing data in more accurate and efficient ways, more means of producing
goods or performing services which often lead to greater production with less resources, and thus
increased productivity.
2. Do teachers have the skills to use the technology to enhance their teaching?
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________
3. What then are the roles of technology for teaching and learning?
_________________________________________________________
_________________________________________________________
_________________________________________________________
________________________________________
Antique's Pride
4. Write honestly the words you are familiar with. Write your idea on the box below about the
word/s you see from the picture.
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
______________________________________________________________________________
In quite a short period of time, ICT have had a marked effect on schools, on teaching and on learning. At the
institutional level, schools have similar needs to any small business and use the same kinds of computer
software for such tasks as accounting, inventory control, communicating, document preparation and printing
Schools also use specialist software for tasks like timetabling, electronic reporting,
behavior tracking and student profiling, monitoring attendance and library management.
In a whole number of ways, then, ICT tools are proving indispensable in making school
administration more efficient and responsive to community needs.
At the instructional level, too, the primary focus in this Guide, the use of ICT in classrooms,
lecture theatres and teaching labs across the Asia-Pacific region is bringing about change in
the way teachers teach and how students learn. An important and forward-looking book
from UNESCO, Teacher Development in an E-Learning Age (Resta and Patru, 2010),
describes how teachers’ roles are changing as a result of implementing ICT in their
classrooms (see Table 1.1).
Antique's Pride
The changing role of teachers is aptly summed up in the quip that teachers have moved from being
“sages on the stage” to becoming “guides on the side”. The teacher is no longer the all- knowing
authority. The new role can perhaps be likened to that of a team coach or the conductor of an
orchestra who tries to bring out the best performance in all players. In the same way that teachers’
roles are changing as a result of the use of ICT, so are the roles of students changing, as seen in
Table 1.2.
Students in classrooms where ICT are regularly found are likely to participate in virtual excursions and
be active researchers, searching the web for information to complete individual or group projects,
communicating via email, blogs and social networking with students and teachers in other schools, and
reaching conclusions on the basis of evidence gathered.
✓ Gaining their attention. Teachers say technology’s visual and interactive qualities can
direct students’ attention toward learning tasks.
✓ Supporting manual operations during high-level learning. Students are more
motivated to learn complex skills (e.g., writing compositions and solving algebraic equations)
when technology tools help them do the low-level skills involved (e.g., making corrections to
written drafts or doing arithmetic).
Antique's Pride
✓ Illustrating real-world relevance. When students can see video and online examples of high-
level math and science skills being used in real-life, it is no longer just “schoolwork”; they are more
willing to learn skills that have clear value to their future life and work.
✓ Engaging students through production work. Students who learn by creating their own
products with technologies such as word processing, multimedia, and other technology products
report higher engagement in learning and a greater sense of pride in their achievements.
✓ Connecting students with audiences for their writing. Educators say that students are
much more motivated to write and do their best writing when they publish it online, since others
outside the classroom will see their work.
✓ Providing support for cooperative work. Although students can do small group work without
technology, teachers report that students are often more motivated to work cooperatively on
presentation software and website production projects.
Problem 2: How to support students’ learning needs? The following are ways technologies can
support students’ learning by making their work more efficient and productive and by providing
access to sources and ways of learning that they would not otherwise have:
✓ Supporting effective skill practice. When students need focused practice in order to
comprehend and retain the skills they learn, drill-and-practice type software offers the privacy, self-
pacing, and immediate feedback that makes practice most effective.
✓ Visualizing underlying concepts in unfamiliar or abstract topics. Simulations and other
interactive software tools have unique abilities to illustrate science and mathematics concepts. Highly
abstract mathematical and scientific principles become clearer and easier to understand.
✓ Studying systems in unique ways. Students use tools such as spreadsheets and simulations to
answer “what if” questions that they would not be able to do easily by hand or that would not be feasible at
all without the benefits of technology.
✓ Giving access to unique information sources and populations. The Internet connects students
with information, research, data, and expertise not available locally.
✓ Supplying self-paced learning for accelerated students. Self-directed students
can learn on their own with software tutorials and/or distance learning materials. They
can surge ahead of the class or tackle topics that the school does not offer.
✓ Turning disabilities into capabilities. Students with disabilities depend on
technology to compensate for vision, hearing, and/or manual dexterity they need to read,
interact in class, and do projects to show what they have learned.
✓ Saving time on production tasks. Software tools such as word processing, desktop
publishing, and spreadsheets allow quick and easy corrections to reports, presentations,
budgets, and publications.
✓ Grading and tracking student work. Personalized learning systems and mobile,
handheld technologies help teachers quickly assess and track student progress, giving them
the rapid feedback, they need to make adjustments to their learning paths.
Antique's Pride
✓ Providing faster access to information sources. Students use the Internet and email to do
research and collect data that would take much longer to gather by other methods.
✓ Saving money on consumables. Software tools such as drill-and-practice and simulations
optimize scarce funds by taking the place of materials (e.g., worksheets, handouts, animals for
dissection) that are used and replaced each year.
Problem 3: How to prepare students for the future? As the discussion of CCSS and 21st-Century
Skills earlier in this chapter showed, skills that students will need in the future will focus more on
skills such as thinking creatively and reasoning effectively, than on memorizing facts, definitions,
and rules. To learn these skills, students will need the following:
✓ Digital literacy. As technologies are increasingly used to store and convey information, digital
literacy, or skills in using both technologies and the information they carry, are viewed as essential
(Pierce, 2013). For many library/media experts, digital literacy is becoming an umbrella term that
encompasses information literacy (Beach & Swiss, 2011; Jewett, 2011; Stripling, 2010). Also, images
and video are increasingly replacing text as communication media, requiring students to learn visual
literacy, or skills in interpreting, creating, and using images. Because images are usually carried via
digital media, visual literacy may be considered a subset of digital literacy.
✓ Digital citizenship. Schools are tasked with teaching students how to use technology resources in
safe, responsible and legal ways.
The following terms and concepts are related to technology that you need to digest.
1. Technology refers to methods, processes, and devices used for practical purposes. It includes
instruments from pencil and paper to modern electronic gadgets and tools for the practical task.
2. Information and Communication Technology and Literacy or ICT Literacy is the use of
digital technology, communication tools and networks to access, manage, integrate, evaluate, create and
communicate information in order to function in acknowledge society (Guro 21, 2011).
3. Educational Technology refers to the utilization of technology in teaching and learning, which
includes both the non-digital (flip charts, pictures, models, realia, etc.). And digital (electronic tools:
hardware, software, and connections, etc.).
4. Digital Literacy refers to the ability to discover, assess, utilize, share, and generate
content with the use of information technologies and the internet (Cornell University).
According to American Library Association (2018), digital literacy is the ability to use
information and communication, requiring both cognitive and technical skills
(https://edweek.org.downloaded06-13-18).
5. Digital Learning is an instructional practice that utilizes technology to reinforce students
learning experience. It covers the use of a broad spectrum of processes that comprises blended
or virtual learning. It can come as online or off-line, which utilizes digital technology.
6. Online Digital Tools and Apps use an Internet connection to access the information
needed, like Skype. It is a telecommunication application software product that focuses on
providing video chat and video calls between computers, tablets, mobile devices via the
Internet and to regular telephones.
Antique's Pride
7. Off-line Digital Tools and Apps can still be used even if there is no internet access. Among
these are Canary Learning, Pocket, Evertone, iBooks, KA LITE (Gupta, Prinyaka, 2017).
8. Instructional Technology refers to the theory and practice of design, development, utilization,
management, and evaluation of the processes and resources for learning (Association for
Educational Communications and Technology, Seels, B.B. &Richey, P.C. 1994).
9. Software refers to program control instructions and accompanying documentation stored on
disks or tapes when not being used in the computer. By extension, the term refers to audiovisual
materials (Smaldino, 2005).
10. Multimedia is a sequential or simultaneous use of a variety of media formats in a given
presentation or self-study program (Smaldino, 2005).
11. Internet is a massive network of networks, a networking infrastructure. It connects millions of
computers globally, forming a network in which any computer can communicate with any other
computer as long as they are connected to the internet. It is generally defined as a global network
connecting millions of computers (http://www.webopedia.com).
12. World Wide Web (www) is also called a Web, which is a graphical environment on computer
networks that allow you to access, view, and maintain documentation that can include text, data,
sound, and videos (Smaldino, 2005). It is a way of accessing information over the medium of the
internet. It is an information-sharing model that is built on top of the Internet.
13. Web Access is the ability of the learner to access the Internet at any point during the lesson to
take advantage of the array of available educational resources.
14. WebQuest is an inquiry-oriented lesson format in which most or all information that learners work
with comes from the web. These can be created using various programs, including simple word
processing documents that include links to websites.
15. Productivity Tools refers to any type of software associated with computers and related technologies
that can be used as tools for personal, professional, or classroom productivity. Examples: Microsoft
Office, Apple Works – word processing, grade and record-keeping, web page production, presentation)
(KFIT-Unesco 2016).
16. Technology Tool is an instrument used for doing work. It can be anything that helps you accomplish
your goal with the use of technology. These technology tools can be classified as:
a. Data/Calculation Tools. Examples: spreadsheets, Excels, Sketchpads, probability
constructor
b. Design Tools. These are used to make models and design, creating, and building.
Included here are Family Tree Maker, GollyGee, and CrazyMachines, among others.
c. Discussion Tools. Four different approaches utilize discussion and interaction on the
Internet. These are threaded discussion forum, Blogging, Live chat, and Video
Teleconferencing, Netiquette, and Safety on the Net.
d. Email Tools. Emails are great communication tools for sending messages, photographs,
videos, and other files. It allows you to reach out to others around the world. Examples are
google mail, Yahoo mail, and many more.
Antique's Pride
e. Handheld Devices. Handheld devices have become popular among learners. These include
Personal Digital Assistants, global positioning system, (GPS) and Geographic Information system
(GIS) in the classroom, Portable electronic keyboards, Digital cameras, Mobile phones, Palm,
Handheld computers.
17. Webquest is a teacher structured research experience for the students that are primarily based
on the use of the World Wide Web and typically takes one or more instructional periods (Bender &
Waller, 2011).
18. Blog is an online journal where posted information from both teachers and students is
arranged. There are three kinds of blogs: blogs used for communication, blogs used for instruction,
and blogs used for both (Ferriter & Garry, 2010).
19. Wiki, an editable website usually with limited access, allows students to collaboratively create
and post written work or digital files, such as digital photos or videos. Wikipedia is one of the most
widely recognized of all the wikis (Watters, 2011).
20. Flipped classroom utilizes a reverse instructional delivery, where the teacher is required to
use the web resources as homework or out of class activity as initial instruction of the lesson, which
will be discussed during class time.
21. Podcast is a video or audio multi-media clip about a single topic typically in the format of the
radio talk show. The two essential functions of a podcast are to retrieve information to disseminate
information (Eash, 2006).
22. Google Apps is a cloud-based teaching tool which is stored in the Google server and is available
for students both at home and in school. It includes the Gmail, a Google Apps is a cloud-based
teaching tool which is stored in the Google server and is available for students both at home and in
school. It includes the Gmail, a
23. Vlog is a video blog where each entry is posted as a video instead of the text.
24. Facebook is a popular social networking site used by students and adults worldwide to present
information on themselves and the world.
25. VOIP (voice over internet protocol) is a category of hardware and software that enables people to use
the Internet as a transmission medium for telephone calls by sending voice data in packets using IP rather
than traditional circuit transmission.
Activity 1
1. Identify three (3) concepts that you learned in this lesson. Write your ideas
about the terms or concepts.
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
___________________________
Antique's Pride
TEST YOURSELF!
Direction: Choose the correct answer from the options given.
1. How best did you learn about the different concepts in ICT? n answer)
a) By memorizing the definition verbatim from the definition.
b) By understanding first, the meaning and memorizing.
c) By memorizing first, then understanding the meaning.
d) A and B
3. What is the fastest way to find the meaning of a word in the Webster?
a) Ask a friend in the library. b) Text the teacher to ask.
c) Google the word in the internet. d) Use another dictionary in the library.
Congratulations on the job well done. You can now proceed to the next
lesson - Roles of Technology for Teaching and Learning
Antique's Pride
Lesson III
Roles of Technology for Teaching and Learning
Introduction
The history of the world is full of technological breakthroughs arising from new scientific discoveries
and technological innovations. What started out as a painfully slow process of discovery, invention,
innovation, and obsolescence has been replaced by what seems to be in permanent flux as one
development is superseded by another at breath taking rates. For instance, with the passing of time,
man’s ways of recording data and his manner of writing has to put it mildly, improved – from carvings
images on stone and then later, writing characteristics with ink onto paper and more recently,
encoding in practically weightless and intangible cyberspace.
Technology as defined by John W. Hill (1975), is the “sum total of the processes by which we modify the
materials of nature to better satisfy our needs and wants.” Technology, therefore, is the technical know-
how that results in the production of machines and gadgets that in turn often results in more ways and
means of gathering and analyzing data in more accurate and/or efficient ways, more means of producing
goods or performing services which often lead to greater production with less resources, and thus
increased productivity.
Technology ushers in fundamental structural changes that can be integral to achieving significant
improvements in productivity. Used to support both teaching and learning, technology infuses classrooms
with digital learning tools, such as computers and handheld devices; expands course offerings, experiences,
and learning materials; supports learning 24 hours a day, 7 days a week; builds 21 st century skills; increases
student engagement and motivation; and accelerates learning. Technology also has the power to transform
teaching by ushering in a new model of connected teaching. This model links teachers to their students and
to professional content resources and systems to help them improve their own instruction
and personalize learning. (US Department of Education)
Online learning opportunities and the use of open educational resources and other
technologies can increase educational productivity by accelerating the rate of learning;
reducing costs associated with instructional materials or program delivery; and better
utilizing teacher time. (Source: www.ed.gov/oii-news/use-technology-teaching-and-
learning)
Antique's Pride
The word technology comes from two Greek words, transliterated techne and logos. Techne means
art, skill craft or the way or means by which a thing is gained. Logos means word, the utterance by
which inward though is expressed, a saying or an expression. So literally, Technology means words
or discourse about the way things are gained. Hence, the word Technology is more associated to
process than tools, which is very ironic because when one is asked “What is technology?”, the
common answer that one can get is more associated to machines or gadgets, and little to no answer
will be heard about technology as a process.
Instructional Media
Instructional media is anything used to send messages from the sender to the receivers to arouse the
learners’ thoughts, feeling, and
interest to gear the students’
learning. It refers to a general
term to mean television, radio,
and newspapers considered as a
whole and as ways of
entertaining or spreading or
information news to a large
number of people. The diagram
illustrates the classification of
instructional media and
examples that belong to each.
Antique's Pride
(both devices and functions) are in Figure 1.1. The very air we breathe literally buzzes with all kinds
of information signals. ICT encompass all the technologies by means of which we can detect these
signals, interpret them and exchange information with others. The term ICT is plural, referring to a
great many technologies. To sum up, ICT is an all-encompassing term that includes the full gamut
of electronic tools by means of which we gather, record and store information, and by means of which
we exchange and distribute information to others.
Educational Technology
Educational Technology is a broad field that covers interrelated areas of academic disciplines. Its very
nature and characteristics make it difficult for one to come up with a clear and acceptable definition.
The bulk of literature shows a considerable amount of information, views and opinions expressed by
scholars and researchers in their attempt to provide a universal understanding of Educational
Technology. The following are some of the notable contributions in the field that will guide
practitioners particularly teachers in understanding this field.
✓ “Educational technology involves the applications of systems, techniques and aids to improve the
process of human learning” (Colier et., 1971)
✓ “Educational technology is concerned with the overall methodology and set of techniques employed
in the application of instructional principles.” (Clearly et. al., 1976)
✓ “Educational technology is a complex, integrated process involving people, procedures, ideas, devices,
and organization, for analyzing problems, and devising, implementing, evaluating, and managing
solutions to those problems, involved in all aspects of human learning.” (Association for Educational
Communications Technology, 1977)
✓ “Educational Technology is a theory about how problems in human learning are identified and solved.”
(Association for Educational Communications Technology, 1977)
✓ “Educational technology is a profession made up of an organized effort to implement the theory,
intellectual technique, and practical application of educational technology.” (Association for Educational
Communications Technology, 1977)
✓ “Educational technology is the systematic approach to designing and evaluating learning and teaching
methods and methodologies and to the application and exploitation of media, and the
current knowledge of communication techniques in education, both formal and
informal.” (Scottish Council of educational Technology, as cited in Ballado, 2012)
✓ “Technology education is problem-based learning utilizing math, science, and technology
principles.” (International Technology and Engineering Educators Association, 2009)
✓ “Educational Technology is the full range of digital hardware and software used to support
teaching and learning across curriculum.” (International Society for Technology in Education,
2008)
✓ Educational technology is the study of and ethical practice of facilitating learning and
improving performance by creating, using and managing appropriate technological
processes.” (Association for Educational Communications Technology, 2008)
Antique's Pride
3 DOMAINS OF EDUCATIONAL TECHNOLOGY (STOSIC, 2015)
1. Technology as Tutor Technology can support the teacher to teach another person or technology
when programmed by the teacher can be a tutor on its own.
2. Technology as a teaching tool. Used to facilitate or lighten the work of the teacher.
3. Technology as a learning tool. It makes learning easy and effective. It can produce learning
outcomes that call for technology-assisted teaching.
Seven Creative Strategies (Osborn, 1963). These have been simplified into fewer
categories. To be creative, one can use any of these strategies.
1. Substitute – find something else to replace to do what it does.
2. Combine – blend two things that do not usually go together.
3. Adapt – look for other ways this can be used.
4. Modify/Magnify/Minify – make a change, enlarge or decrease.
5. Put to another use – find other uses
Antique's Pride
6. Eliminate – reduce or remove
7. Reverse – turn upside-down, inside out, front-side back
Further, teachers can do the following to develop and enhance critical thinking, problem solving and
creativity. As a future teacher, try these suggestions:
• Encourage students to find and use information from variety of sources both online and off-line.
• Assist students to compare information from different sources.
• Allow student to reflect through different delivery modes like writing, speaking, or drawing.
• Use real experiences and material to draw tentative decisions.
• Involve students in creating and questioning assessment.
Antique's Pride
_______________________________________________________________________________
_______________________________________________________________________________
___________________________________________________________
TEST YOURSELF!
Direction: Choose the correct answer from the options given.
Antique's Pride
At the end of the unit, the students must have:
1. Discussed some ICT policies and explained their implications to teaching and learning
2. Enumerate the national ICT policies affecting classroom practices
3. Identify ICT policies that are incorporated to the design and implementation of teaching-learning
activities
4. Explained some issues that relate to ICT policies
5. Identified safety concerns on internet including digital safety rules
Introduction
Globalization is a reality and ICT has become a fundamental part of the process. A networked society
is one in which the entire planet is organized around telecommunicated networks of computers. The
powerful use of network has broken boundaries, provided opportunities for inclusion and
collaboration. However, there will be a struggle for those who did not have access or those who are
excluded, marginalized and powerless. Thus, a need to establish policies in the use of ICT is
imperative. As the Department of Information, Communication and Technology (DICT) says: “The
future has arrived. Now we have to ensure that we have a place in it. Restrictions of distance have
been broken by technology at present times. Now when we live in a technology-based society, ICT
learning is one of the best methods of teaching students through virtual classrooms. The relationship
between ICT and Education has been one of rapid change from technology to learning. Schools
increasingly determine new technologies and models for teacher professional development in
enhancing teaching and learning (Ndongfack, 2010). The importance of national policies and
programs for the realization of ICTs can be an essential tool in education. According to Schmidt, et
al., (2009), the way teachers use ICT tools for effective teaching can be an important tool for
information communication technology development for learning and teaching.
Antique's Pride
LESSON I
ICT NATIONAL OR INTERNATIONAL POLICIES
THAT ARE APPLICABLE TO TEACHING AND LEARNING
Introduction
The Internet today has become a space where individuals can express their freedom of speech and
expression, as enshrined in Article 19 of the Universal Declaration of Human Rights and the
International Covenant on Civil and Political Rights (ICCPR). As former UN Special Rapporteur Frank
La Rue said, the Internet has become an “enabler” of rights. The internet is a new environment that
continues to evolve with constant technological advances, and remains an unchartered terrain for
many, especially in the realm of law, policy and governance. Thus, at times, both governments and
non-State actors still struggle to adjust to this new environment. This has sometimes resulted in
confusion with unfamiliar contexts, as ICTs and the Internet may be used both to advance human
rights, and to enable violations of these same rights.
Globalization is a complex concept that involves political, economic and socio-cultural orders and has
created new global ideologies. Globalization is a multifaceted word that does not refer to a single notion
but can be characterized as a systematic integration of commercial, cultural and technological
advancements. The information and communication revolution are one of the most important factors in
globalization and has changed people’s relations and the relative meaning of time and space, reducing
communicative distance, demolishing physical boundaries while increasing relations between people,
governments and cultures (Neyestani & McInturuff, 2006).
Information and Communications Technology (ICT) can impact student learning when teachers are digitally
literate and understand how to integrate it into the curriculum. When you want every student to enumerate
national ICT policies, each time you teach, understanding the existing and planned
national policies related to ICT, may help you achieve your goal. You will find the answers
to this question in this lesson.
Antique's Pride
The provision of ICT to academic staff and students is critical to recommend them to more effective
learning environments. By overcoming the needs and reinforcing the functional aspects, it may help
decision-makers to employ academic staff on an investigation of the status of the developments of
ICT in improving the teaching and learning environment in educational institutions. (Alzahrani,
2017).
The ability of policymakers to innovate on related policy issues outperform technological innovations
because it changes and evolves. Different institutions in different countries formulated and proposed
policies in various forms. Lack of rigorous and significant evidence complicates the attempts to
outline impactful ICT/education policies.
The World Bank‘s Systems Assessment for Better Education Results (SABER) initiative, as part of their
work, attempts to document national educational technology policies around the world and their
evolution over time. Policymakers try to benchmark their policies on ICT use in education against
international norms, so a related SABER- ICT policy framework has been developed. Likewise, those
of comparator countries around the world, identify key themes and characteristics, draw on an analysis
of their policy documents.
There are eight policy themes around the world that are commonly identified in educational technology
policies; (1) vision and planning; (2) ICT infrastructure; (3) teachers; (4) skills and competencies; (5)
learning resources; (6) EMIS; (7) monitoring and evaluation; and (8) equity, inclusion, and safety. The
framework only considers policy intent but not the extent to which policies are realized in practice, nor
the impact of such policies. The policymakers are challenged to offer useful related policy guidance for
rapid developments and innovations in the technology sector (Trucano, 2016).
SABER-ICT policy framework may find useful by policymakers as a means to help their country benchmark
the current state of related policy development. It can look forward to potential future policy directions and
gain inspiration from other countries. There are two official documents wherein Policy on the use of ICTs
in the Philippine basic education system is articulated. The Medium-Term Development Plan of the
Philippines (MTPDP) 2004-2010. The MTPDP states:
Antique's Pride
and education, with computer literacy much emphasis. The Act of 1998 (R.A. 8484) was passed to
generate the participation of companies and to engage the private sector. There are programs with
DepEd through streamline data collection to improve ICT education. To help schools to participate
in ICT-related programs, the DepEd Computerization Program (DCP) was implemented.
According to Arinto (2006), policy statements on ICT integration in Philippine primary education
reflect a human development perspective. However, critical ICTs for schools ‘programs tend to be
informed by a human capital approach. The human development perspective joined the mainstream
of education and development in the 1990s, and it now reinforces the international consensus on
Education for All and the Millennium Development Goals, However, many educational reform
efforts. It continues to influence the human capital perspective (Avalos, 2003).
1. An ICT policy is a roadmap to ICT implementation strategies. Learn more in: Technology Integration
in Educational Administration
2. An ICT policy is a roadmap to ICT implementation strategies. Learn more in: Gender and ICT Policy
for Development and Empowerment: A Critique of a National ICT Policy
3. A road map of actions adopted and pursued by various governments involving issues in ICT such as
access and civil liberties that are crucial to civil society. ICT policy main aspects are telecommunication
(mainly telephone communication), broadcasting (radio and TV) and the internet.
4. A set of pre-defined actions with a view to encouraging the use of ICT in every socio-economic endeavor.
A policy is typically described as a deliberate plan of action to guide decisions and achieve rational
outcome(s). However, the term may also be used to denote what is actually done, even though it is
unplanned. Learn more in: An Evaluation of ICT Policy Developments in Botswana
5. A National ICT Policy is a policy put into place by governments and stakeholders’ who are committed
to the process of bringing digital technology to all individuals and communities so that they can have
access to information.
The Philippine Roadmap For Digital Startups Is A Short And Long-Term Strategic Plan For
The Philippine Startup Community And The Department Information and Communication
(DICT) Technology Towards Developing digital Innovation In The Country. The Goal of
This Initiative Is to Generate Innovative Startups That Will Spur Economic Growth and to
Find Solutions to Society’s Most Pressing and Pervasive Issues. This Roadmap Is A
Framework That Clearly Defines Our Overall Direction To Push For Digital Innovation –
One That Can Leverage The Country’s Resources To Its Highest Potential.
Antique's Pride
Patterns Of Technology Startup Ecosystem – Provides Insights From Various Startup
Ecosystems Around The World, Highlighting Key Features Of Each Ecosystem. It Also Explores The
Philippines’ Current Progress In Those Defined Key Areas As Well As A Swot Analysis Of The Local
Ecosystem.
Action Plan – Enumerates The Short And Long-Term Recommendations For All Stakeholders To
Improve The Philippine Digital Startup Ecosystem As Well As The Localized Programs Based On
Existing Programs From International Ecosystems.
Eight policy themes are commonly identified in educational technology policies around the world.
These relate to: (1) vision and planning; (2) ICT infrastructure; (3) teachers; (4) skills and
competencies; (5) learning resources; (6) EMIS; (7) monitoring and evaluation; and (8) equity,
inclusion, and safety.
A Philippine Declaration on Internet Rights and Principles was evolved and launched; it looked into
ten (10) core rights and principles: Internet access for all; democratizing the architecture of the
Internet; freedom of expression and association online; right to privacy and protection of personal data;
gender equality on the Internet; openness and access to information, knowledge and culture;
socioeconomic empowerment and innovation; ICT education and digital literacy; liberty, safety and
security on the Internet; and, Internet and information and communications technologies (ICTs) for
environmental sustainability.
(https://www.uprinfo.org/sites/default/files/document/philippines/session_27_may_2017/js11_upr
27_phl_e_main.pdf)
With these developments, laws and policies pertaining to the Internet have been enacted to address new
developments, especially in relation to technology. Some of these laws include, among others, the E-
Commerce Act of 2000 (RA 8792), the AntiChild Pornography Act of 2009 (RA 9775), the Anti-Photo and
Video Voyeurism Act of 2009 (RA 9995), the Data Privacy Act of 2012 (RA 10173), the Cybercrime
Prevention Act of 2012 (RA 10175), and the Expanded Anti-Trafficking in Persons Act of 2012 (RA 10364).
There are also a number of executive issuances related to legacy telecommunications regulation by the
National Telecommunications Commission (NTC).
Antique's Pride
people filing cases against the media have produced a chilling effect and could lead to self-
censorship. The fear of imprisonment or the imposition of fines has prevented media from criticizing
government officials.
Antique's Pride
LESSON II
SAFETY ISSUES ON THE USE OF ICT
Introduction
The Internet is without a doubt one of the best resources available to us. Unfortunately, it's also
extremely dangerous if you aren't aware of who and what lurks behind the scenes. Everyone should
know how to be safe when surfing the web, but internet safety tips and tricks are spread out all over
the web without a go-to resource. Since the majority of internet scam and virus victims are students
and young people, Open Colleges is a perfect place to post the very first full guide to being safe on the
internet.
Technology is a phenomenon that seems to be uncontrollable. Despite the so many benefits for teaching
and learning, there are also negative effects or influence on the learners. Hence as future teachers you
have to be aware of how to safeguard learners in the school communities where they spend most of their
waking hours and also in their homes of facilities that provide opportunities to use digital technologies
like Internet cafes. Safeguard and protection should be the primordial role of parents, teachers and
schools. There are so many risks that we have to be aware of in the use of digital technologies. (Bilbao,
et.al.)
Originally, with the active participation of the learner and instructor, the implementation of ICT in education
was to change the teaching and the learning process from the traditional instructional teacher-centered
endeavor to a learner-centered approach with the active participation of the learner coach (Voogt et al., 2013).
The most natural part for the effective integration of ICT into the educational system is given enough capital
although the process of integration is complex and multifaceted, like in curriculum and
pedagogy, teacher competencies, institutional readiness, and long-term financing, to
improve the quality of education, policymakers and implementation managers must have
a clear vision in investments of ICTs that requires a vast amount of money. Such massive
investments require not only careful planning for skills enhancement of both teachers and
learners but also thoughtful implementation. Both policymakers and implementation
managers at the national and institutional levels need to plan for the introduction of high
technology and understand the contextual complexities of the educational ecosystem of the
communities. Youths acquire ICT skills faster than adults, according to the studies of the
World Youth Report (2003) and more likely to share these skills with their peers either
intentionally or through interaction. Hu & McGrath (2012) study reports on the
implementation of the national reform in Chinese secondary schools.
Antique's Pride
The study focused on the use of ICT in teaching the English language. Findings indicated that the
majority of the teachers have a positive attitude towards ICT and happy with the current ICT use in
English. Moreover, results showed that some teachers find difficulties in changing from the
traditional pedagogical method of teaching to a technological based pedagogy. Hu and McGrath
(2012) suggested that continuous professional development programs that can motivate the
attitudes of teachers positively to equip them with new ICT skills After substantial worldwide
implementation ICT in schools, studies have found out that those teachers who are more proficient
in using ICT focus on the internet search and word processing instead of project-based teaching
(Phelps, Graham, & Watts, 2011). Mingaine (2013) observed that despite the benefits of ICT, the
school management had not fully implemented the policies developed by the Ministry of Education
in Kenya. They assert that some schools had developed guidelines on how to implement ICT, but no
attempt was made to achieve them. This prompted an investigation of challenges that hindered the
efficient implementation of ICT in public secondary schools in Meru County.
Mooij and Smeets (2001) suggested five successive phases of ICT implementation representing
different levels of ICT transformation of the educational and learning processes. These include: (1) the
incidental and isolated use of ICT by one or more teachers (2) increasing awareness of ICT relevance at
all levels (3) emphasis on ICT co-ordination and hardware (4) focus on didactic innovation and ICT
support (5) use of ICT-integrated teaching and learning that is independent of time and place. The
study of Tondeur et al. (2008) entitled -ICT integration in the classroom: challenging the potential of
school policy. Findings showed that there is a potential impact of policy-related factors on the actual
integration of ICT in teaching-learning in daily classroom instruction. Results suggested that success
in ICT integration is related to activities at the school level, like, ICT support, the development of an
ICT plan, and ICT training. The results also suggest that principals have a big role in facilitating the
policies put in place when defining this policy.
Antique's Pride
The Government today unveiled tough new measures to be like the UK that is the safest
place in the world to be online.
In the first online safety laws of their kind, social media companies and tech firms will be legally
required to protect their users and face severe penalties if they do not comply. The eSafety Toolkit for
Schools is designed to support schools to create safer online environments. The resources are backed
by evidence and promote a nationally consistent approach to preventing and responding to online
safety issues.
The resources are categorized into four elements: Prepare, Engage, Educate, and Respond. Each
contributes to creating safer online environments for school communities, whether the resources
from each element are used on their own or collectively, each contributes to creating safer online
environments for school communities.
• Prepare
Prepare resources to help schools evaluate their willingness to deal with online safety issues and deliver
suggestions to improve their practices. They are useful for strengthening school policies and procedures
in online safety.
• Engage
All members of your school community should be active participants in creating and maintaining safe
online environments. Engage resources to encourage the participation of the school community in creating
a safe online environment. They help engage school community members as involved and valued
participants, and they facilitate the real involvement of students.
• Educate
Preventing an online incident is always better than having to respond to one. The Educate resources support
schools in developing the knowledge, skills, and capabilities of students, staff, and parents to have positive
and secure online experiences. They bid best practice guidance for online safety education and sit alongside
eSafety‘s complement of curriculum-aligned teaching-learning activities.
• Respond
There must be processes in place in case an incident happens so that it is controlled
appropriately. The Respond resources support schools to evaluate and respond to online
incidents effectively. They preserve digital evidence, offer guidance to understand reporting
requirements, minimized more harm, and supporting wellbeing. eSafety developed the
Toolkit in consultation across every state and territory with government and non-government
education sector representatives. It was established in response to the Royal Commission into
Institutional Responses to Child Sexual Abuse and the Education Council ‘s work program to
report bullying and cyberbullying.
Antique's Pride
• Some Risks in the Use of ICT
1. Exposure to inappropriate content, including on-line pornography,
extremism (exposure to violence associated with racist language);
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyber-bullying in all forms, receiving sexually explicit images or messages;
4. Privacy issues including disclosure of personal information;
5. Health and well-being (amount of time spent on-line, internet gaming and many more;
6. Prolonged exposure to on-line technologies, particularly at an early age;
7. Addiction to gambling and gaming;
8. Theft and fraud from activities such as phishing;
9. Viruses, Trojans, spyware and other malware; and
10. Social pressure to maintain online network via texting and social networking sites.
Safety Strategies
• When you first get a new computer or phone, increase security by enabling firewalls for your computer,
network or phone (see settings) and install or run anti-spyware and anti-virus software; set your
computer or device to automatically install updates.
• Don’t open any attachments if you don’t know the sender, or you suspect abuse. Instead delete the
attachment or have IT staff look at it.
• Trust your instincts. If someone knows too much about your computer activity, your computer may be
monitored. Use a “safer” computer (one the abuser does not have any access to) for private
communications and web browsing.
• Consider changing passwords and creating new accounts on another computer. Do not
access those accounts or use those passwords on the monitored computer.
Antique's Pride
Safety Strategies
• Has someone fiddled with, fixed, or given you a new part for your computer?
• Look for a small piece that connects the keyboard cord to the computer; it can also be part of an
external keyboard, or something installed inside a laptop.
• Change passwords on accounts from another computer and do not access those accounts from the
compromised computer. With some services, you can ask to get an alert (e.g. fraud alert) if your
password gets changed or your account gets changed.
Safety Strategies
• Trust your instincts. If someone seems to know too much or show up in random places, check for
hidden GPS devices or other location tracking services. Consider notifying law enforcement.
• A device can be hidden in your belongings or vehicle. Check the trunk, under the hood, inside the
bumper and seats. A mechanic or law enforcement can also do a search.
• Safety plan around/before removal of any location tracking device, as it may alert the abuser.
Mobile Phones
Description/Risks
• Phones can be a lifeline for victims.
• Phones can be hidden inside vehicles as listening devices by using the “silent mode” and “auto answer”
features.
• Most phones have GPS chips and location tracking abilities, which can be used to determine someone’s
location.
• Logs showing phone usage may be monitored on the actual phone or over the Internet
via the phone company’s online billing record.
• Joint phone plans with an abuser may give that person access to phone features and calling
log information.
• If your phone has a Bluetooth device, the stalker might try to connect with your phone using
the Bluetooth to access information on your phone or intercept your communications.
Safety Strategies
• For additional privacy and safety, consider getting a separate donated phone from a shelter
or purchasing a new phone (e.g. a pay-as-you-go phone).
• Mechanics or law enforcement can check the vehicle to determine if a phone has been
hidden somewhere.
Antique's Pride
• Contact carrier to add a password or code to account to protect from wrongful access.
• You can change the phone’s location setting to “E911 only” or “911 only” so that the phone company
only access your GPS if you dial 911.
• Also check if your phone has any applications installed that separately ask to access and use your
real-time location, such as for mapping directions. Settings such as “show all/hidden applications”
might unveil some hidden applications. Consider turning off or uninstalling these applications.
• Use phone settings to change your default Bluetooth password, set Bluetooth to hidden, and turn
Bluetooth off.
• Always give location information to 911 in an emergency.
Email
Description/Risks
• It is like a postcard and is not a private form of communication.
• Can be monitored and intercepted in a variety of ways, many times without your knowledge.
Stalkers can intercept and monitor email using spyware or by getting your password; they
might change your email settings so they can get secretly forwarded or secretly copied
PHISHING - phishing is one that is geared specifically toward retrieving someone's personal
information and using it to harm them. An identity thief, known as the phisher, will lure victims
using emails and websites that seem harmless or secure. designated as bcc) on every email you
send or receive from that account.
Safety Strategies
• Avoid filling out the information that the email asks you to give.
• If you think your email is being monitored, consider creating an additional new email account on a safer
computer.
• Avoid opening suspicious emails especially email from unknown sender.
• When setting up a new email account, don’t use any identifying information.
• Avoid passwords that others can guess.
• If you receive threats by email, save the electronic copies. Keep the emails in the system, but also consider
forwarding a copy to another email account. You can also print copies of the email; see if the print version
can display the full email header.
• Consider reporting email threats or hacked accounts to law enforcement. These are crimes and the police
can use email header information to help trace emails to the original sender.
Hidden Cameras
Description/Risks
• Affordable, accessible, and easy to install, cameras come hidden in various items (clocks,
plants, etc.).
• Can be wired into your house or transmit wirelessly.
• Can be very difficult to detect.
• Can create image files that include time, date and location data.
• Abuser can install camera surveillance and monitor all your activity remotely over the
Internet.
Antique's Pride
Safety Strategies
• Trust instincts. If abuser knows something that can only be seen, a camera may be being used.
• Camera detectors can help to find wireless cameras that are giving off a signal but will not detect a
wired camera.
• Law enforcement may help to search for hidden cameras.
Safety Strategies
• Do searches on yourself to see what information is available.
• Be cautious and creative when providing personal information: only provide information that you feel
is critical and safe for things like store discount cards.
• Ask schools, employers, courts and government services about Internet publications. Request that your
information and photos not be posted in public directories or online. In court systems, ask up front how
your court records can be sealed and not posted online for safety reasons.
• If you have a restraining order, providing that can expedite these requests.
CYBER BULLYING
"Cyber Bullying is the use of the Internet and related technologies to harm other people in a deliberate,
repeated, and hostile manner." – Wikipedia
1.FLAMING - Online fights using electronic messages with angry and vulgar language.
2.HARASSMENT - Repeatedly sending nasty, mean, and insulting messages.
3.DENIGRATION - "Dissing" someone online. Sending or posting gossip or rumors about
a person to damage his or her reputation or friendships.
Antique's Pride
4. IMPERSONATION - Pretending to be someone else and sending or posting material to
get that person in trouble or danger or to damage that person's reputation or friendships.
5. OUTING -Sharing someone's secrets or embarrassing information or images online.
6. TRICKERY -Talking someone into revealing secrets or embarrassing information, then
sharing it online.
LEGAL ISSUES
Cyberbullying is not to be handled lightly and can quickly become a serious problem. There have been
many cases where cyberbullying has resulted in victims fearing for their lives and even committing
suicide. There are specific actions that can actually cause a bully to break civil or criminal laws.
CIVIL LAWS
In this case, a victim should try to resolve this problem by seeing a bully's parents or asking an attorney
for advice on how to handle the situation.
A. Defamation - Someone publishes a false statement about a person that damages his or her
reputation
B. Invasion of privacy/public disclosure of a private fact - Someone publicly discloses a
private fact about a person under conditions that would be highly offensive to a reasonable person.
C. Invasion of personal privacy/false light -Publicly disclosing information that places an
individual in a false light.
D. Intentional infliction of emotional distress -Someone's intentional actions are outrageous
and intolerable and have caused extreme distress.
CRIMINAL LAWS
When a bully is accused of breaking criminal laws, they can be subject to prosecution and even arrest.
Hate or bias crimes
Making violent threats to people or their property.
Engaging in coercion. Trying to force someone to do something they don't want to do.
Making harassing telephone calls, sending obscene text messages, and stalking.
Sexual exploitation and sending sexual images of children under 18.
Taking a photo of someone in a place where privacy is expected (locker room, bathroom,
etc.) and exploiting it on the internet.
PREVENTION
Luckily, there are practices you can put in place today to prevent cyber bullying from
happening. Even though there's no "one size fits all" solution, here are some of the steps
you can take:
1. Tell someone.
Antique's Pride
2. Don't instigate.
3. Block them.
4. Be aware.
5. Always log out.
PLAGIARISM
"Plagiarism is the wrongful appropriation and purloining and publication of another author's
language, thoughts, ideas, or expressions, and the representation of them as one's own original work."
- Wikipedia
Plagiarism is such a dirty word; you spend your entire life hearing about how bad it is and all of the
awful things that happen if you do it. In reality, your entire educational career is founded on some
form of plagiarism. All of your research papers and presentation involve information that you learned
from somewhere else. While directly copying someone else's work can land you in some serious
trouble, paraphrasing and citing your sources will end up saving your life someday.
CONSEQUENCES OF PLAGIARIZING
Plagiarizing is a very serious situation so before we get into safely using copyrighted works, let's go through
some things that might happen if you directly copy another's work.
a. Expulsion - Almost every school from high school to college has zero tolerance for plagiarism.
b. Court - Stealing someone else's work is called copyright infringement and depending on the circumstances you
might end up in front of a judge and jury.
c. Fines - Infringement penalties are very harsh, fines can be anywhere from $500 to $150,000 for each act of
willful infringement.
WHAT IS COPYRIGHTED?
The seven categories that copyright law covers are:
Literary works - Both fiction and nonfiction, including books, periodicals, manuscripts, computer
programs, manuals, phonorecords, film, audiotapes, and computer disks.
Musical works and accompanying words, songs, operas, and musical plays.
Antique's Pride
Dramatic works - Including music, plays, and dramatic readings
Pictorial, graphics, and sculptural works - Final and applied arts, photographs, prints and art reproductions, maps,
globes, charts, technical drawings, diagrams, and models.
Motion pictures and audiovisual works - Slide/tape, multimedia presentations, filmstrips, films, and videos.
FAIR USE
There are some sources that you can copy from without having to cite. This method of copyrighting is called fair
use. There is a large gray area for which works fall under fair use, though.
Antique's Pride
Example
Hoffa, James. Solid Cement Mortuary Designs. New York: East River Press, 2009. Print.
Chicago
Example
Pollan, Michael. The Omnivore's Dilemma: A Natural History of Four Meals. New York: Penguin, 2006.
The examples given above were citing books only. Citing works in medias other than printed in a book will look
different but will follow the same structure.
b. PARENTHETICAL CITATIONS
Parenthetical Citations are used in the middle of your work and are placed directly after a quotation. They refer to
your works cited by briefly indicating which source that specific quotation came from.
Example:
The St. Martin's Handbook defines plagiarism as "the use of someone else's words or ideas as [the writer's] own
without crediting the other person" (Lunsford and Connors 602).
Lunsford, Andrea, and Robert Connors. St. Martin's Handbook. 3rd. ed. New York: St. Martin's Press, 1995.
As you can see, the parenthetical citation always comes directly after the quoted material. It can contain the
author's name, the page number from where the quote came from, or both.
c. PARAPHRASING
Paraphrasing is when you take in an outside source's information and put it into your work using your own words.
All of the information will stay the same, but the sentence structure will change. Even though you aren't directly
copying the author, you are using their information so you still must cite them.
Example:
Original work "But Frida's outlook was vastly different from that of the Surrealists." (258)
Paraphrase As Herrera explains, Frida's surrealistic vision was unlike that of the European Surrealists. (258)
Hayden Herrera, Frida: A Biography of Frida Kahlo (258)
Because paraphrases don't quote the author directly and they are your own words, they
do not need quotation marks.
Antique's Pride
• Anderson, J. (2010). ICT transforming education: A regional guide. Published by UNESKO
Bangkok, 120.
• Alzahrani, M. G. (2017). The Developments of ICT and the Need for Blended Learning in Saudi
Arabia. Journal of Education and Practice, 8(9), 79-87.
• Arinto, P. B. (2006, September). Reflections on ICTs in basic education policy and practice in the
Philippines. In 2nd National ICTs in Basic Education Congress (pp. 6-7).
• Bilbao, P. et al. (2019). Technology for teaching and learning 1. Quezon City, Philippines: Lorimar
Publishing, Inc.)
• Blurton, C.,―New Directions of ICT-Use in Education‖. Available online
http://www.unesco.org/education/educprog/lwf/dl/edict.pdf; accessed 7 August 2002.
• Dzidonu, C. (2010). An analysis of the role of ICTs to achieving the MDGs. United States of America:
Division for Public Administration and Development Management, United Nations Department of
Economic and Social Affairs (UNDESA).
• Gloria, R. T., DECS Memorandum 90, s. 1997, Department of Education, Culture, and Sports, Pasig
City, 18 March 1997.
• Hu, Z., & McGrath, I. (2012). Integrating ICT into College English: An implementation study of a
national reform. Education and Information Technologies, 17(2), 147- 165.
• Jannah, M., & Higgins, S. Islamic Studies Teachers ‘Perceptions of Using a Blended Learning Approach
for Teaching the Islamic Education Curriculum in Saudi Arabia. DOING EDUCATION DIFFERENTLY,
59.
Antique's Pride
• Khattak, R., & Jan, R. (2015). The impacts of ICT on the students’ Performance: A Review of Access to
Information. Res Human Soci Sci, 5(1), 85-94.
• Mingaine, L. (2013). Challenges encountered by Principals during implementation of ICT in public
secondary schools, Kenya. Journal of Sociological Research, 4(2), 1.
• Mooij, T., & Smeets, E. (2001). Modelling and supporting ICT implementation in secondary schools.
Computers & Education, 36(3), 265-281.
• Ng, W. K., Miao, F., & Lee, M. (2009). Capacity-building for ICT integration in education. Digital Review of
Asia Pacific, 2010, 67-76.
• Nkwenti Ndongfack, M. (2010). ICT Integration in Cameroon Primary Schools: A Case
Study of Government Primary Practicing School Angele, South Region. Master's
Dissertation, Kuala Lumpur: Open University Malaysia.
• Pellegrino, J.W. and M.L. Hilton (eds.) (2012), Education for Life and Work: Developing
Transferable Knowledge and Skills in the Twenty-First Century, National Academies
Press, Washington, DC.
• Phelps, R., Graham, A., & Watts, T. (2011). Acknowledging the complexity and diversity of
historical and cultural ICT professional learning practices in schools. Asia- Pacific Journal of
Teacher Education, 39(1), 47-63.
• Rimando, T. P. (2001). -Senate, DECS set computer project for public schools‖, in Manila
Bulletin, 13.
Antique's Pride