0% found this document useful (0 votes)
15 views38 pages

Lesson 2 ICT POLICIES (STUDENTS)

The document discusses the importance of integrating Information and Communications Technology (ICT) in teaching and learning, emphasizing the need for teachers to be digitally literate to enhance student engagement and understanding. It outlines national and international ICT policies aimed at improving education quality and addresses issues like digital citizenship, cyberbullying, and the ethical use of technology. Additionally, it highlights the role of digital media in fostering responsible online behavior and the consequences of cyberbullying.

Uploaded by

Rica Jean Varona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views38 pages

Lesson 2 ICT POLICIES (STUDENTS)

The document discusses the importance of integrating Information and Communications Technology (ICT) in teaching and learning, emphasizing the need for teachers to be digitally literate to enhance student engagement and understanding. It outlines national and international ICT policies aimed at improving education quality and addresses issues like digital citizenship, cyberbullying, and the ethical use of technology. Additionally, it highlights the role of digital media in fostering responsible online behavior and the consequences of cyberbullying.

Uploaded by

Rica Jean Varona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 38

ICT POLICIES AND SAFETY

ISSUES IN TEACHING AND


LEARNING
“There can be infinite uses of the
computer and new-age technology, but if
teachers themselves are not able to bring
it into the classroom and make it work,
then it fails.”
-Nancy Kassebaum-
ICT National or
International Policies
that are Applicable to
Teaching and Learning
Information and Communications Technology
(ICT) can impact student learning when
teachers are digitally literate and understand
how to integrate it into the curriculum.
There are two official documents
wherein Policy on the use of ICTs in the
Philippine basic education system is
articulated. The Medium-Term
Development Plan of the Philippines
(MTPDP) 2004-2010.
The MTPDP states:

1. ICT will be harnessed as a powerful enabler of


capacity development. It will, therefore, be
targeted directly towards specific development
goals like ensuring basic education for all and
lifelong learning, among others and the 2002
Basic Education Curriculum (BEC), that stipulates
the following goal of Philippine primary education.
2. We must educate our Filipino learners to
filter information critically, seek credible
sources of knowledge, and use data and
facts creatively so that they can survive,
overcome poverty, raise their personal and
national esteem, and realize a gracious life
in our risky new world.
ICT IN TEACHING SCIENCE

In National Policy on Information and


Communication Technology in School Education
(2012), it is mentioned that “ICT enabled teaching-
learning encompasses a variety of techniques, tools,
content and resources aimed at improving the quality
and efficiency of the teaching-learning process.
Ranging from projecting media to support a lesson, to
multimedia self-learning modules, to simulations to virtual
learning environments, there are a variety of options
available to the teacher to utilize various ICT tools for
effective pedagogy. Each such device or strategy also
involves changes in the classroom environment, and its
bearing on effectiveness.
ICT integration makes learning
environment more engaging,
pragmatic, relevant, self-directed,
reflective as well as it encourages
the learners to study topics in a way
that leads to deep and
understandable knowledge based on
learning objectives.

Osborne & Hennesy, 2003).


It also boosts motivation,
interest and participation in
teaching-learning activities.
(Denby & Campbell,
2005).
ICT in science education can create an
environment where students may
visualize and manipulate complex
models, 3-D visuals for better
understanding of scientific concepts and
can assist students in focusing on
important concerns, making underlying
abstract concepts more salient.
(Denby & Campbell, 2005; Dori & Barak, 2001; Rogers, 2006).
ICT also enable users to
access high-quality and
useful resources (web-
pages, documents, videos,
simulations etc.) for
scientific learning.
(Osborne & Hennesy, 2003).
Use of ICT encourages
experimentation and inquiry
by offering quick visual
feedback which can also help
students in learning how to
use ICT or develop their
digital literacy.
(Newton & Rogers, 2001; Osborne & Hennesy,
2003).
National Policies
 A National ICT Policy is a policy put into place so that the government and
stakeholders can have access to information that is committed to bringing
digital technology to all individuals and communities.
International Policies
 The international policymakers join forces to successfully implement ICT in
educational practice to address the individual needs of students, the
implications of technology for student assessment, and teacher learning to
successfully implement technology (Voogt, 2013).
Patents grant inventors the
right to exclude others from
making, using, offering for
sale, importing, or selling the
invention in the United
States.

There are three types of


patents: utility patents,
design patents, and plant
patents.
Copyrights cover original works
fixed in any tangible medium of
expression, such as literary,
musical, dramatic, artistic, and
other intellectual works. Copyrights
are granted to authors, whether the
original works are published or
unpublished. Copyrights protect the
books you read, the movies you
see, the music you listen to, the
software that runs on your
computers and smartphones, and
even the blueprints for your home.
Trademarks include any word,
name, symbol, or device
(combination thereof) used to
identify and distinguish goods or
services and to indicate the
source of those goods or
services. Trademarks can consist
of words, images, colors, sounds,
distinctive packaging, and even
smells like the distinctive aroma
of Play-Doh!
Trade secret law provides
protection for proprietary
information used by a
business enterprise. This
can include protection for
technological and
business know-how that is
maintained in secret.
Digital citizenship is the ability to navigate
our digital environments in a way that's safe
and responsible and to actively and
respectfully engage in these spaces.
Digital media also provide unique opportunities for
everyone to get involved, to speak out and to make
change both online and offline. Our actions in our
online world can have a real impact and we all
have a role to play as active digital citizens.
FOUR CATEGORIES OF DIGITAL
CITIZEN

1.Empathy and Community


2.Positive Technology Use
3.Sharing Information
4.Ethics and Privacy
Empathy and Community
• I remind myself that there's a real person behind the screen
• I reach out to help if I see someone being cyberbullied
• I take a break before doing anything when I get angry
• If I get in a conflict with someone I know online, I talk it out in
person
• I push back against hate and prejudice when I see them online
• I report hate and harassment when I see them online
• I complain to platforms and advertisers if I see them supporting
hate
• I speak out to shape the values of my online communities
Positive technology use

• I use digital tools to connect with my friends and


family
• I use digital tools to be an active citizen in my
community
• I’m mindful of my digital media use and use
digital devices as tools at specific times for
specific purposes
Sharing information

• I check reputable sources before sharing info


• I share information that I know is useful and reliable
• I challenge misinformation without giving it extra
attention
• When I see information online, I ask:
• What do I already know about this?
• Why do I want to believe or disprove it?
• What would make me change my mind?
Rights, privacy and ethics

• I use tools, settings and preferences to manage my privacy


• I respect other people’s privacy when I share things online
• I know how to ethically access content like music, games
and videos
• I know my Fair Dealing rights and how to use public domain
and Creative Commons media
• I know my rights as a citizen, a consumer and a human
being and how to assert them online
 Teaching digital citizenship in the classroom
 By teaching students’, the various aspects of
digital media literacy from an early age, educators will start
students on the road to active and responsible digital
citizenship. As digital citizens, students should have the
ability to access, use, understand and engage with media
(including online communities); apply critical thinking to all
the media they use and consume; and know how to all
these things ethically and effectively.
Cyberbullying is the use of technology to
harass, threaten, embarrass, or target
another person. Online threats and mean,
aggressive, or rude texts, tweets, posts, or
messages all count. So does posting personal
information, pictures, or videos designed to hurt
or embarrass someone else.
 Cyberbullying also includes photos, messages, or pages that don't get
taken down, even after the person has been asked to do so. In other
words, it's anything that gets posted online and is meant to hurt, harass,
or upset someone else.

 Intimidation or mean comments that focus on things like a person's


gender, religion, sexual orientation, race, or physical differences count as
discrimination, which is against the law in many states. That means the
police could get involved, and bullies may face serious penalties.
What Are the Consequences of
Cyberbullying?

 Online bullying, like other kinds of bullying, can lead to serious long-lasting problems.
The stress of being in a constant state of upset or fear can lead to problems with mood,
energy level, sleep, and appetite. It also can make someone feel jumpy, anxious, or sad.
If someone is already depressed or anxious, cyberbullying can make things much
worse. Students who are cyberbullied can struggle to concentrate in school, which can
affect how well they do there.

 Some types of cyberbullying may violate school codes or even break anti-discrimination
or sexual harassment laws. So a bully may face serious legal trouble.
Why Do People Do It?

Why would someone be a cyberbully? There are


probably as many reasons as there are bullies
themselves.
Sometimes, what seems like online harassment may
be accidental. The impersonal nature of text
messages, posts, and other ways of communicating
online means it can be hard to figure out if someone
is joking or not.
Why Do People Do It?

Most people know when they're being bullied,


though, because bullying involves repeated
insults or threats. The people doing the bullying
know they've crossed a line, too. It's not a one-off
joke or insult — it's constant harassment and threats
that go beyond typical fun teasing or a nasty
comment made in anger.
What Can I Do About Cyberbullying?

 Tell someone.
 Walk away.
 Resist the urge to retaliate or respond. it is a good idea to
save evidence of the bullying if you can. It can help you
prove your case, if needed.
 Report bullying.
 Block the bully.
 Be safe online.
If a Friend Is a Bully

Without putting your friend down, stand up for


your own principles: Let the bully know it's not
OK.
Explain to your friend that bullying can have
serious consequences: for the bully, for those
being bullied, and even for bystanders like you
and your friends.
Cyberspace mainly refers to the computer which
is a virtual network and is a medium
electronically designed to help online
communications to occur. This facilitates easy
and accessible communications to occur across
the world. The whole Cyberspace is composed of
large computer networks which have many sub-
networks. These follow the TCP or IP protocol.
 Internet Protocol or IP is the protocol or method that
involves sending data from one device to another using
the internet. Each and every device has an IP address
that is unique to it and this gives it its identity. The IP
address enables communication and exchange of data
to other devices across the internet. It defines how
devices and their applications will exchange packages
of data with each other and connected networks. All
the transfer occurs through either of the Internet
Protocol Suite or protocols i.e. either TCP or IP.
Cyberspace is that space in which users share
information, interact with each other; engage in
discussions or social media platforms, and many
other activities. This concept was introduced by
William Gibson in his book ‘Neuromancer’ which was
done in 1894.
This term is still widely used among everyone as it is
rapidly growing and used for various purposes by an
individual.
Netiquette is a made-up word from the words net and etiquette.
Netiquette thus describes the rules of conduct for respectful and
appropriate communication on the internet.
Netiquette is often referred to as etiquette for the internet. These
are not legally binding rules, but recommended rules of
etiquette. Netiquette is mostly used for dealing with unknown
people on the internet. The rules of netiquette very depending on
the platform and its participants .

You might also like