Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

Unit 3: ICT Policies and Safety Issues in Teaching and Learning

Lesson 1: The 21st Century Learner


I. Learning Compass: Desired Learning Outcomes
At the end of the unit, the students must have
1. discussed the skills needed in the 21st century; and
2. created a caricature of a 21st century learner and a digital citizen.

II. Module Overview


Generally, education in the old days focused on the three R’s, that is, teaching
the learners how to read, write, and perform arithmetic. The three R’s were
sufficient enough to prepare learners in the real world. However, with the
advancement of technologies, a new set of skills is needed to meet the demand
of this rapidly changing technological world. These skills are called as the 21 st
century skills. These are intended to help learners to survive and keep up with
the lighting-pace of the modern world. Although each of the 21 st century skills is
unique in how it helps learners, they all have one quality in common – they are
all essential in the age of Information.

III. We’re On Our Way: Course Contents and Learning Experiences


All teachers want to help their learners to succeed in life. The kind of good
education we had in the past is no longer enough for the learners to succeed in
career and citizenship in the 21 st century. The present landscape of education
should provide learners meaningful experiences and opportunities to acquire and
develop other essential skills. Skills that can help us keep up with this technology-
driven society. What do you think are these skills?

A. Activity
Directions: Describe the new breed of learners in the 21 st century. Write at
least 20 descriptions inside the box.
Do the descriptions fit to you as learner? Are these skills enough for the learners to cope
with the demand of the modern world? Why or why not?

Analysis
Task 1: Skills Inventory
Directions: Kindly list down the skills you need to have for you to cope with
the ever-changing society and indicate their corresponding uses.
Skill Use

Critical thinking

Creativity

Collaboration

Communication

Information literacy

Media literacy

Technology literacy

Flexibility

Leadership

Initiative
Productivity

Social skills

Note: Use separate sheet if necessary

The skills that you have listed are called as 21st century skills. These are
abilities that you need to succeed in your career in the Information Age. There
are twelve 21st century skills and these are: (1) critical thinking, (2) creativity,
(3) collaboration, (4) communication, (5) information literacy, (6) media
literacy, (7) technology literacy, (8) flexibility, (9) leadership, (10) initiative,
(11) productivity, and (12) social skills. A student who possesses these skills
is called as the 21st century learner or the digital citizen.

Are you familiar with these skills? Do you have all these 21 st century skills? If
your answer is YES, congratulations! You are indeed a 21 st century learner.
Now, let us explore these skills.
Task 2: Exploring the 21st Century Skills
Directions: Please look for the definition of the following terms and indicate
the source of the definition.
21st Century Definition Source
Skills Note: Use APA
format

Critical thinking

Creativity

Collaboration

Communication

Information
literacy

Media literacy

Technology
literacy

Flexibility

Leadership

Initiative

Productivity
Social skills

Once the table is filled up with the required information, compare the results to
any of your classmates in any possible means.

C. Abstraction
The 21st century skills could be categorized into three, namely (a) learning
skills, (b) literacy skills, and (c) life skills. The Learning Skills, also known as
the four C’s, consist of the following skills: critical thinking, creativity,
collaboration, and communication. The Learning Skills teach you about the
mental processes required to adapt and improve upon a modern work
environment (Stauffer, 2020). The Literacy skills are also known as IMT
which stands for
information literacy, media literacy, and technology literacy. These skills focus
on how students can discern facts, publishing outlets, and the technology
behind them. There is a strong focus on determining trustworthy sources and
factual information to separate it from the misinformation that floods the
Internet (Stauffer, 2020). And the Life skills are also called as FLIPS which
stands for flexibility, leadership, initiative, productivity, and social skills. These
skills take a look at the intangible elements, which focus on both personal and
professional qualities, of a student’s everyday life (Stauffer, 2020).

According to Mike Ribble (2011), there are nine elements that comprise a
digital citizen. These are:
1. Digital Access: Full electronic participation
• Access to digital tools including laptops, cameras, internet
• Recognizing individual needs and barriers to participation including special needs

2. Digital Commerce: Online buying and selling of goods


• Purchasing and selling items on auction sites and/or online stores
• Using digital coupons
• Purchasing and downloading media through sites like iTunes

3. Digital Communications: Electronic exchange of information


• Email, blogs, social networking through Facebook and Twitter, instant
messaging/texting
• Managing an online identity – digital footprint
• Understanding privacy and public settings and situations when
communicating online
• Impacts of online relationships compared to face to face.

4. Digital Literacy: Process of teaching and learning about technology and the
use of technology • Skills in effectively finding and evaluating internet
resources
• Using tools to help manage and filter media from the internet including
social bookmarking, privacy settings, spam
• Making connections between digital tools to enhance learning

5. Digital Etiquette: Ways of conducting oneself in a digital


environment • Using technology to reflect best
qualities and codes of conduct
• Using technology when appropriate
• Respecting the privacy and rights of others

6. Digital Law: Responsibility for actions and deeds using electronics


• Creating original works that are free from plagiarism
• Respecting the digital data and information of others, including
copyright and creative commons
• No intentional, malicious acts including computer hacking, virus
development, identity theft
• Bullying

7. Digital Security: Electronic precautions to protect learners, staff, and


organizations • Following Acceptable Use Policies
• Using technology responsibly
• Reporting incidents to ensure security and safety is maintained for all

8. Digital Health and Wellness: Physical and psychological well-being in


a digital world • Balancing time spent online with time spent
offline
• Knowing stress injuries related to overuse including eye strain
9. Digital Rights and Responsibilities: Freedoms extended to those in a
digital world • Keeping your devices and identities online secure by
using safe, private passwords • Protecting personal security by
managing the personal information posted online

D. Application
Directions: Please answer the questions comprehensively.

Among the 21st century skills, which is not yet developed or the least
developed in you?
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______

How can you possibly develop or master this skill?


______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______

IV. How Far Have We Gone: Evaluation


Caricature Making (20 points)
Directions: In letter size (short) bond paper, create a caricature of a 21 st
century learner. Then discuss comprehensively this type of learner.

Note: Alternative output is a digital caricature.

V. Enhancement
Directions: Commit yourself to become a responsible 21 st century learner. Kindly write at
most five (5) commitments in the template below.

I commit
____________________________________
____________________________________
____________________________________
____________________________________
____________________________________
____________________________________
____________________________________
____________________________________
____________________________________
____________________________________

____________________________________
Signature over Printed Name

VI. References
Ribble, M. (2011). Digital Citizenship in Schools, Second Edition. International Society for
Technology in Education (ISTE®).

Stauffer, B. (2020). What are 21st Century Skills? Applied Educational Systems, Inc.
Lesson 2: The ICT Policies in Education

I. Learning Compass: Desired Learning Outcomes


At the end of the unit, the students must have:
1. enumerated the national ICT policies affecting classroom practices;
2. described the implementation of ICT policies in teaching-learning; and
3. identified ICT policies that are incorporated to the design and
implementation of teaching learning activities.

II. Module Overview


Information and Communication Technology (commonly known as ICT) can
impact learning when teachers are digitally literate and understand how to
integrate ICT into the curriculum. How the teachers use the technology for the
intended purpose is a different thing than just schools having a variety of ICTs
used. Hence, the development of clear cut ICT policies on the integration of ICT
in the process of teaching and learning is vital. Having acknowledged the
importance of these policies, our Government and even some of the international
entities have developed and recommended ICT policies in education. These
policies ensure the acceptable uses of ICT within the educational landscape.

III. We’re On Our Way: Course Contents and Learning Experiences


You can use various ICT tools in the teaching and learning process. Now, let us
see the ICT tools that you have tried using in teaching and learning.

A. Activity
ICT Tools Inventory
Directions: Kindly list down at least five (5) ICT tools that you have used and
indicate how you used these tools in education
ICT tools How did you use it?

Note: Use separate sheet if necessary

B. Analysis
Consider the tools that you have identified in the activity: ICT Tools Inventory.

Among these tools, which do you think is/are the most effectively used in
education? Why?
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______

And which is/are the least effectively used in education? Why?


___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______

So, how can you possibly use this tool effectively?


___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______
___________________________________________________________
_______

As a teacher, is it necessary and important to use effectively these ICT tools?


Explain.
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
To optimize the benefits of technology in education, there is a need then to
chart the direction of ICT use and create a plan of action. This could be done
through the development of ICT policies.

C. Abstraction
In the Philippines, Republic Act no. 10844, also known as “Department of
Information and Communication Act of 2015”, stated the national policies on
ICT. These are: (a) Recognize the vital role of information and communication
in nation-building; (b) Ensure the provision of astrategic, reliable, cost-efficient
and citizen-centric information and communications technology (ICT)
infrastructure, systems and resources as instruments of good governance
and global competitiveness;
(c) Ensure universal access to quality, affordable, reliable and secure ID’
services; (d) Promote the development and widespread use of emerging
ICT and foster and accelerate the convergence of ICT and ICT-enabled
facilities;
(e) Ensure the availability and accessibility of ICT services in areas not
adequately served by the private sector
(f) Foster an ICT sector policy environment that will promote a broad
market-led development of the ICT and ICT-enabled services (1CT-
ES) sectors, a level playing field, partnership between the public and
private sectors, strategic alliance with foreign investors and balanced
investments between high-growth and economically-depressed areas;
(g) Promote and assist the development of local ICT content, applications
and services which may include support for ICT-based start-up
enterprises through strategic partnerships;
(h) Promote the use of ICT for the enhancement of key public services,
such as education, public health and safety, revenue generation, and
socio-civic purposes;
(i) Encourage the use of ICT for the development and promotion of the
country’s arts and culture, tourism and national identity;
(j) Promote digital literacy, ICT expertise, and knowledge-building among
citizens to enable them to participate and compete in an evolving ICT
age:
(k) Empower, through the use of ICT, the disadvantaged segments of the
population, including the elderly, persons with disabilities and indigenous
and minority groups; (l) Ensure the rights of individuals to privacy and
confidentiality of their personal information;
(m) Ensure the security of critical ICT infrastructures including information
assets of the government, individuals and businesses; and
(n) Provide oversight over agencies governing and regulating the ICT
sector and ensure consumer protection and welfare, data privacy and
security, foster competition and the growth of the ICT sector.

However, these national policies are generic policies and are not just solely
crafted for the purpose of ICT use in education.

One the other hand, some international organizations who serve educators
interested in the use of technology, have designed ICT policies tailored fitted
to education. One of these organizations is the international nonprofit
organization ISTE (International Society for Technology in Education). ISTE
inspires educators around the globe to use technology in innovating teaching
and learning, accelerating good practices and solving tough problems in
education by providing community, knowledge and a framework of policies for
rethinking education and empowering learners. The organization
recommended the following standards for educators, teachers, and students.

Note: Please refer to the ISTE website (www.iste.org) for the details of these
ICT standards for teachers, educators, and students.

D. Application
Directions: Considering the ISTE standards, kindly fill in the table below.
You as student You as a preservice teacher

Standards Standards Standards Standards


Met or NOT Met or Met or NOT Met or
Satisfied Satisfied Satisfied Satisfied
IV. How Far Have We Gone: Evaluation
Written Report (30 points)
Directions: Make a written report of the following contents:
• Enumerate the national ICT policies affecting classroom practices
• Identify the ICT policies that are incorporated to the design and
implementation of teaching-learning activities
• Describe the implementation of ICT policies in teaching-learning

Note: The output should be in letter-size word doc file.

V. Enhancement
Directions: Answer - If you were given a chance to formulate an ICT policy for
education, what could that be?

State the policy.


__________________________________________________________
_______
__________________________________________________________
_______
__________________________________________________________
_______
__________________________________________________________
_______

What is the rationale of the policy?


__________________________________________________________
_______
__________________________________________________________
_______
__________________________________________________________
_______
__________________________________________________________
_______
__________________________________________________________
_______

Note: “rationale” means an underlying reason or basis

VI. References
ICT and Education Policies. The World Bank Group.

ICT Policy and Planning. (2014). Department of Information and


Communications Technology (DICT). Republic of the Philippines
ISTE Standards for Educators. International Society for Technology in

Education (ISTE®). Miao, F. UNESCO’s Work in ICT in Education

Policy. UNESCO.

Republic Act no. 10844: Department of Information and Communications


Technology Act of 2015. (2015). Official Gazette of the Republic of the
Philippines.

Lesson 3: The Responsible Use of ICT in Education


I. Learning Compass: Desired Learning Outcomes
At the end of the unit, the students must have:
1. given examples on social, ethical, and legal responsibility in the use of
technology tools and resources;
2. identified examples of compliance of Intellectual Property Rights (IPR) in
educational setting; and
3. enumerated digital safety rules that ensure online safety and prevent
cyberbullying, and standard netiquette

II. Module Overview


In the fourth industrial revolution, technology has become an integral part of our
lives. This eventually changes the dynamic of our society which affects on how
we relate to other people. Since this change is inevitable, at least we can
introduce a framework so that you can develop a healthy and safe relationship
while learning using these technologies.

III. We’re On Our Way: Course Contents and Learning Experiences


When we use ICT, we also develop new habits on how we use the technology.
Some of these are acceptable and some are not. Now, let us see if which of our
habits below are acceptable.

A. Activity
Directions: Please put a check mark ( ) on the space provided after
the statement that is considered as acceptable ICT practice, and X if
not.
Statements Acceptabl
e

1 Log out of computer systems when you have finished


using them

2 Let anyone else use any of your accounts or tell anyone your
password
3 Remember that all use of ICT facilities is logged and
monitored

4 Use ICT facilities to bully or harass other people

5 Uninstall security software from your university-owned


devices

6Only use University/School IT systems for purposes


relating to your study, research or work at the
University/School

7Access pornographic or obscene material or material that


could offend others

8 Install unlicensed or malicious software

9 Think carefully about online conduct to protect personal


information

10 Use ICT facilities to advertise goods or services

11 Keep your operating systems and software up to date.

12 Download videos, music or anything else that is


copyrighted by other people

13 Remember that every website you visit or page that you


print costs the University/School money

Note: Based from the IT Acceptable Use and Security Policy of


The University of Adelaide Answer key: Check (1, 3, 6, 9, 11, 13), X (2, 4, 5, 7, 8, 10, 12)

How many correct answers did you get?

B. Analysis
Directions: Cite a situation observed in your locality (it could be in your
home, school, or community) where each of the following issues is
highlighted.
ICT Issues Situation

Health

Safety

Social

Ethical

Legal

Why these situations are considered ICT issues?


______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______
______________________________________________________________
_______

C. Abstraction
Health Issues of ICT
The following are the health issues of using ICT:
Eye-Strain (also known as tiredness of the eyesand medically called as
asthenopia). It occurs when your eyes get tired from intense use such as
working at the computer for an extended period of time. The common
symptom of eye-strain is headache and blurring of the vision.

This problem can be solved as follows:


• Take regular eye breaks to help your eyes focus at
different distances • Use an anti-glare filter in front of the
monitor
• Wear computer glasses when working with your computer, if necessary.

Back and Neck Ache. Working at a computer desk is a common cause of


back and neck pain. In most cases, you accommodate to your workstation
than the other way around. This compromises good sitting posture.

This problem can be solved by taking regular breaks: get up, walk around,
stretch your muscles and by redesigning your workspace to encouraged
well-aligned posture such as: • Using an adjustable, ergonomic chair, and
take the time to set it up properly. • Placing the computer keyboard and
monitor at the correct height for the seated person (keyboard lower than
the elbow, top of monitor at eye level).

Repetitive Strain Injury (RSI) in Wrists and Hands (sometimes referred


to as repetitive stress injury). It is a gradual buildup of damage to muscles,
tendons, and nerves from repetitive motions (same movement over and
over again) such a typing and using of computer mouse.

This injury can be treated conservatively. This includes RICE (which


stands for Rest, Ice Compression, and Elevation), nonsteroidal anti-
inflammatory drugs, steroid injections, and exercises as prescribed by the
physical therapist. But RSI could be avoided if you:
• Use a wrist-rest to support the wrists while typing and when using
the mouse. • Take regular breaks from typing or using the mouse.

Safety Issues with ICT


Using computers can also pose threat to safety, but there are some ways to avoid the
danger:

Trailing Cables. Computer cables for power supply, network, etc. are
sometimes lying on the floor. These cables may cause people to trip over
them. One of solutions could be placing cables inside cable ducts, or
under the carpet/flooring.

Spilt Drinks or Foods. Spilt drinks or foods can result in damage to the
electrical equipment or electric shock to the computer user. Thus, drinks
and foods should be kept away from this equipment.
Overloaded Power Sockets. Too many power cables plugged into a
socket will result to overloaded circuit. And this eventually causes
overheating and fire. So, avoid plugging too many cables into a socket.
See to it that there are fire extinguishers are available nearby.

Heavy Objects Falling. Some of the items in computer equipment are


very heavy such as the printers and monitor. These may cause serious
injury if they fall on people. Thus, make it sure that the equipment is
placed properly on strong tables/shelves.

Social, Ethical and Legal Responsibilities in the Use of Technology


Tools and Resources
It is our responsibility to use technology for the greater good and interest.
Netiquette should always be observed and illegal practices such as hacking,
use of malware and computer virus, illegal copying of software, illegal use of
ideas/works of others, and cyberbullying, must be avoided at all times.

Netiquette (a portmanteau for network etiquette or internet etiquette). It is


a set of social conventions that facilitates interaction over networks.
According to UTEP CONNECT Extended University, there are 10 rules of
netiquette for students. These are: 1. Make sure identification is clear in all
communications
2. Review what you wrote and try to interpret it objectively
3. If you would not say it face to face, do not say it online
4. Do not assume everyone understands where you are coming from
5. Do not spam
6. Use emoticons
7. Respect other’s privacy
8. Remember, if it is on the internet, it is everywhere
9. Follow the rules
10. Forgive and forget

Hacking. It is the gaining of unauthorized access to data in a computer


system. Some people break into a system just out of curiosity or for the
challenge. But, it is more likely that they are breaking in to access
valuable data.

To protect your computer from hacking, you should do the following:


• Use strong passwords (not your birthdays or name) to protect your
user login account
• Never reveal your login password to anyone else
• Place a firewall between your computer and any network
• Disconnect from networks when you are not using them
• Encrypt any sensitive information (just in case they get in)

Malware (the portmanteau for malicious software). It is a software


specifically designed to disrupt, damage, or gain unauthorized access to a
computer system. The following are some examples of malware:
• Spyware (a software used to gather information about a person or
organization, without their knowledge, and send such information to
hack another entity without the consumer’s consent)
• Adware or advertising-supported software. (a software that generates
revenue for its developer by automatically generating online
advertisements in the user interface)
• Root kits (a set of software tools that enable an unauthorized user to
gain control of a computer system without being detected)

Computer Virus. A computer virus is a computer software that, when


executed, replicates itself by modifying other computer programs and
inserting its own code without the users knowledge or permission.

To protect your computer from viruses and prevent them infecting your
computer, you can do the following:
• Install anti-virus software and keep it up-to-date
• Install anti-malware software
• Never download and install software from the Internet unless you are
certain it is from a trusted source
• Never open e-mail attachments unless you have scanned them
• Never click links in websites that seem suspicious
• Run a virus scan on it before opening any files when someone wants
to use memory stick or CD-ROM in your computer
• Do not trust cracked versions of software from file-sharing sites

Software Copyright. Illegally copying software is often referred to as


software piracy. Holding the copyright for software means that you have
the protection of the law if anyone tries to steal your software. Under
copyright law, people must NOT: • Copy the software for other people
• Lend the software to other people
• Rent the software to other people
• Install the software on a network when other users can access it
(unless it is a special ‘network’ version)

Intellectual Property Rights (IPRs)


The IPRs help protect creations of the mind that include inventions, literary
or artistic work, images, symbols, etc. It usually gives the creator an
exclusive right over the use of his/her creation for a certain period of time.
In the Philippines, the law for intellectual property is the RA no. 8293
(otherwise known as the Intellectual Property Code of the Philippines).
Hence, it is expected for our students (or anyone) to properly cite the
copyrighted works of other person. Usually, the APA in-text citation style is
used in citing works.

Note:
You may refer to the web for the latest APA citation guidelines.
You can download the RA no. 8293 file at Official Gazette of the Republic of the
Philippines.

Cyberbullying (or cyberharassment). It is a form of bullying or harassment


using electronic means. This includes posting rumors, threats, sexual
remarks, a victims’ personal information, or pejorative labels. In the
Philippines, these acts are punishable by law under Cybercrime
Prevention Act of 2012 (officially recorded as RA no. 10175).

D. Application
Brochure Making (10 points)
Directions: Create a brochure (hardcopy or digital copy) of the digital safety
rules that ensure online safety and prevent cyberbullying.
Note: You are highly encouraged to post your digital brochure in your
social networking site account.

IV. How far Have You Gone: Evaluation


Compliance Portfolio (30 points)
Directions: Make a portfolio (hardcopy or digital copy) with the following
contents: • examples on social, ethical, and legal responsibility in the
use of technology tools and resources (Note: attach the necessary
evidences); and
• evidences of compliance of Intellectual Property Rights (IPR) in educational
setting.

V. Enhancement
Directions: Suggest tips on how to use ICT responsibly in education. Use the
mnemonic below in presenting your tips. The first tip was already provided to
you.

E – Ensure privacy of your personal information when using the web


D–
U–
C–
A–
T–
I–
O–
N–
VI. References
Coply, S. IGCSE ICT. Igcseict.info.
Republic Act no. 8293: Intellectual Property Code of the Philippines. (1997).
Official Gazette of the Republic of the Philippines.

Republic Act no. 10175: Cybercrime Prevention Act of 2012. (2012). Official
Gazette of the Republic of the Philippines.

You might also like