Lesson 7 Social Ethical and Legal Responsibilities in The Use of Technology Tools and Resources

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Lesson 7: Social, Ethical and Legal Responsibilities in the Use of

Technology Tools and Resources


A. Internet and Education
Internet, the most useful technology of modern times which helps us not only in our
daily lives but also in professional lives. For educational purposes, it is widely used to gather
information and to do research or add to the knowledge of various subjects.

Internet plays a very vital role in education. It is no doubt that in this modern era
everyone prefers Google for their queries, problems or doubts. Popular search engines like
Google, Yahoo, etc. are the topmost choice of people as they offer an easy and instant reach to
the vast amount of information in just a few seconds. It contains a wealth of knowledge that can
be searched at any time. The internet has introduced improvements in technology,
communication, and online entertainment.

Today, it has become more important as well as a powerful tool in the world which is
preferred by everyone. Everybody needs internet for some or other purposes. Students need
internet to search for information related to exams, curriculum, results, etc. You can also follow
these steps for students to achieve success in student life.

Importance of internet in education to the students’ means that it makes easier for
them to research things, and relearn the content taught in the school. People use it according to
their needs and interests.

There are many benefits of the internet in the field of education. Some of these are:

1. Cost Effective and Affordable Education


One of the largest barriers to education is high cost. The Internet improves the quality of
education, which is one of the pillars of sustainable development of a nation. It provides
education through Videos (like youtube tutorial videos) and web tutorials which is affordable to
everyone and cost-effective.

2. Student – Teacher and Peer Interaction


The internet has allowed students to be in constant touch with their teachers or with other
fellow classmates with the help of social media, messaging apps and chat forums. Parents can
interact as well as communicate with teachers and school authorities about their kid’s
performance in the school. Interaction with the like minded people on forums can help students
to explore new ideas and enrich their knowledge.

3. Effective Teaching and Learning Tool


The Internet has become a major tool for effective teaching as well as a learning tool. Teachers
can use it as a teaching tool by posting their teaching materials (notes and videos) on school
website or forum . The learning process becomes interesting and diverse with the use of tutorial

Technology in Teaching and Learning I ECQ 2020 1


videos and notes. Teachers can teach with the use of animation, powerpoint slides, and images
to capture the students’ attention.

4. Easy Access to Quality Education


Students can easily access quality education materials like tutorial videos on youtube for free or
pay fees online for more quality study materials. Teachers can also make use of the internet by
proving the students with extra study material and resources such as interactive lessons,
educational quiz as well as tutorials. Teachers can record their lectures and provide it to the
students for revisions which is better than reading from notes.

5. Interaction with Digital Media


Regular use of digital media is one of the most basic parts of our lives. Digital bulletin boards
save paper, allow displaying of videos and audios to attract the attention of students.
Nowadays, there are many paid sites which provide education resources which are rich in
quality and easily understandable to masses.

6. Keeping you updated with Latest Information


Information is the biggest advantage which the internet is offering. There is a huge amount of
information available for every subject. It keeps us up to date with the latest information
regarding the subjects in which we are interested.

7. Learning with Multimedia


It helps the students with the learning process as it helps to simplify the knowledge. Also, it
helps to visualize what is being taught by the teachers in school. If you want to prepare for final
exams, you can access Video Tutorials and other resources online through the Internet.

8. Bridging Communication Gaps


Classroom Internet use can also help teachers say goodbye to communication mishaps such as
lost assignment sheets and misplaced memos home to parents. Internet communication can
make distribution of information easier, as well as increase class community and motivation. For
example, having a class blog or website can open up dialogue between teachers and students
outside of school rather than confining their interactions to the classroom. Students can
download course materials and readings, chat with other students, and share their work, while
parents can receive reminders about upcoming due dates and events.

The Internet is a boon to the people, which is used all over the world. Hence, it should
be used for good purpose. It has had a great impact on imparting education to the children. If
this is used in appropriate ways that meet children’s development level, they can benefit and
learn from the Internet.

www.theasianschool.net
https://www.theclassroom.com/benefits-laptops-students

Technology in Teaching and Learning I ECQ 2020 2


B. Intellectual Property Rights Applicable to the Educational Set-
ting: Copyright and Related Rights Copy-right Law
Intellectual property includes literary or artistic works, inventions, business methods,
industrial processes, logos, and product designs. Nearly every activity engaged in by students,
staff, and faculty in schools involves the production or use of intellectual property; examples
include lesson plans, student assignments, speeches and lectures, videos, books, school Web
sites, publications, reports, concerts, and plays. Most items used in education are legally
protected intellectual property, often owned by someone other than the user. All members of
school communities are permitted to use protected intellectual property, but they must engage
in “fair use” or get advance permission of the owners. Users must be careful not to use
intellectual property unlawfully, or they risk having to pay damages, fines, and/or court costs.
Items in the public domain, however, may be used without cost to the user or consent of the
owner.
Legal issues affecting intellectual property in education involve both creation and use of
intellectual works. Intellectual property law balances the rights of individuals to make, own,
distribute, and profit from their creations and the rights of the public to make use of knowledge
and inventions. Illustrations of the law of intellectual property in education include copyright
and patent protection for the products of teaching and scholarship, copyright and patent
infringement for improper use of protected works, and trademark licensing and protection of
names, logos, symbols, and pictures used to identify schools.
By far, the most applicable category of intellectual property law in schools is copyright.
Copyrights are intangible rights granted through the federal Copyright Act to an author or
creator of an original artistic or literary work that can be fixed in a tangible means of expression
such as hard copies, electronic files, videos, or audio recordings. Copyright law protects literary,
musical, dramatic, choreographic, pictorial, sculptural, and architectural works as well as motion
pictures and sound recordings. Each copyrightable work has several “copyrights”—the exclusive
rights to make copies of the work, distribute the work, prepare derivative works, and perform or
display the work publicly.
With some important exceptions, two of which are highlighted here, teachers and
students may not use the copyrighted works of others without permission of the copyright
holders. The first exception, fair use, is the most important and most often cited. The fair use of
a copyrighted work, “for purposes such as criticism, comment, news reporting, teaching
(including multiple copies for classroom use), scholarship, or research, is not an infringement of
copyright.” If the use is a fair use, then the user need not obtain advance consent of the
copyright holder. Determining whether the use is fair requires the application of four factors:
purpose and character of the use, nature of the copyrighted work, amount and substantiality of
the portion used in relation to the work as a whole, and effect of the use upon the potential
market for or value of the work. The second exception is also fairly common in schools; it is not
an infringement for teachers and students to perform or display a copyrighted work in the
course of face-to-face or online/distance education teaching activities. For electronic display or
performance, the school must comply with several additional requirements.
Daniel, P. T. K., & Pauken, P. D. (2005). Copyright laws in the age of technology

Technology in Teaching and Learning I ECQ 2020 3


C. Digital Safety Rules
With more users accessing the Internet through mobile devices, a lot of risks are
changing and growing quickly. Even though apps loom larger in most people's daily online
interactions than traditional websites do, that does not mean that the basic Internet safety rules
have changed. Hackers are still on the lookout for personal information they can use to access
your credit card and bank information.
Unsafe surfing can also lead to other threats—from embarrassing personal comments or
images that, once online, are nearly impossible to erase, to getting mixed up with people you'd
rather have had nothing to do with.
Here are the Top 10 Internet safety rules to follow to help you avoid getting into trouble
online (and offline).

1. Keep Personal Information Professional and Limited


Potential employers or customers don't need to know your personal relationship status
or your home address. They do need to know about your expertise and professional
background, and how to get in touch with you. You wouldn't hand purely personal information
out to strangers individually—don't hand it out to millions of people online.

2. Keep Your Privacy Settings On


Marketers love to know all about you, and so do hackers. Both can learn a lot from your
browsing and social media usage. But you can take charge of your information. As noted by
Lifehacker, both web browsers and mobile operating systems have settings available to protect
your privacy online. Major websites like Facebook also have privacy-enhancing settings
available. These settings are sometimes (deliberately) hard to find because companies want
your personal information for its marketing value. Make sure you have enabled these privacy
safeguards, and keep them enabled.

3. Practice Safe Browsing


You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous
neighborhoods online. Cybercriminals use lurid content as bait. They know people are
sometimes tempted by dubious content and may let their guard down when searching for it.
The Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could
expose personal data or infect your device with malware. By resisting the urge, you don't even
give the hackers a chance.

4. Make Sure Your Internet Connection is Secure.


Use a Secure VPN Connection when you go online in a public place, for example by using
a public Wi-Fi connection, PCMag notes you have no direct control over its security. Corporate
cybersecurity experts worry about "endpoints"—the places where a private network connects
to the outside world. Your vulnerable endpoint is your local Internet connection. Make sure
your device is secure, and when in doubt, wait for a better time (i.e., until you're able to connect
to a secure Wi-Fi network) before providing information such as your bank account number.

Technology in Teaching and Learning I ECQ 2020 4


To further improve your Internet browsing safety, use secure VPN connection (virtual
private network). VPN enables you to have a secure connection between your device and an
Internet server that no one can monitor or access the data that you’re exchanging.

5. Be Careful What You Download


A top goal of cybercriminals is to trick you into downloading malware—programs or
apps that carry malware or try to steal information. This malware can be disguised as an app:
anything from a popular game to something that checks traffic or the weather. As PCWorld
advises, don't download apps that look suspicious or come from a site you don't trust.

6. Choose Strong Passwords


Passwords are one of the biggest weak spots in the whole Internet security structure,
but there's currently no way around them. And the problem with passwords is that people tend
to choose easy ones to remember (such as "password" and "123456"), which are also easy for
cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify.
Password manager software can help you to manage multiple passwords so that you don't
forget them. A strong password is one that is unique and complex—at least 15 characters long,
mixing letters, numbers and special characters.

7. Make Online Purchases from Secure Sites


Any time you make a purchase online, you need to provide credit card or bank account
information—just what cybercriminals are most eager to get their hands on. Only supply this
information to sites that provide secure, encrypted connections. As Boston University notes, you
can identify secure sites by looking for an address that starts with https: (the S stands for secure)
rather than simply http: They may also be marked by a padlock icon next to the address bar.

8. Be Careful What You Post


The Internet does not have a delete key, as that young candidate in New Hampshire
found out. Any comment or image you post online may stay online forever because removing
the original (say, from Twitter) does not remove any copies that other people made. There is no
way for you to "take back" a remark you wish you hadn't made, or get rid of that embarrassing
selfie you took at a party. Don't put anything online that you wouldn't want your mom or a
prospective employer to see.

9. Be Careful Who You Meet Online


People you meet online are not always who they claim to be. Indeed, they may not even
be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up
to unwary Web users and pick their cyber pockets. Be as cautious and sensible in your online
social life as you are in your in-person social life.

10. Keep Your Antivirus Program Up to Date


Internet security software cannot protect against every threat, but it will detect and
remove most malware—though you should make sure it's to date. Be sure to stay current with

Technology in Teaching and Learning I ECQ 2020 5


your operating system's updates and updates to applications you use. They provide a vital layer
of security.
https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do-online

D. Cyberbullying
Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view, participate in, or share content. Cyberbullying
includes sending, posting, or sharing negative, harmful, false, or mean content about someone
else. It can include sharing personal or private information about someone else causing
embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal
behavior.

The most common places where cyberbullying occurs are:

1. Social Media, such as Facebook, Instagram, Snapchat, and Twitter


2. SMS (Short Message Service) also known as Text Message sent through devices
3. Instant Message (via devices, email provider services, apps, and social media messaging
features)
4. Email

With the prevalence of social media and digital forums, comments, photos, posts, and
content shared by individuals can often be viewed by strangers as well as acquaintances. The
content an individual share online – both their personal content as well as any negative, mean,
or hurtful content – creates a kind of permanent public record of their views, activities, and
behavior. This public record can be thought of as an online reputation, which may be accessible
to schools, employers, colleges, clubs, and others who may be researching an individual now or
in the future. Cyberbullying can harm the online reputations of everyone involved – not just the
person being bullied, but those doing the bullying or participating in it. Cyberbullying has unique
concerns in that it can be:

Persistent – Digital devices offer an ability to immediately and continuously communicate 24


hours a day, so it can be difficult for children experiencing cyberbullying to find relief.

Permanent – Most information communicated electronically is permanent and public, if not


reported and removed. A negative online reputation, including for those who bully, can impact
college admissions, employment, and other areas of life.

Hard to Notice – Because teachers and parents may not overhear or see cyberbullying taking
place, it is harder to recognize.

According to the consolidated report of Department of Education (Dep Ed), bullying


cases on elementary and high school of both private and public schools on 2014 rose by 21% or
a total of 6,363 cases, compare with the 5,236 on 2013.

Schools, however, to mitigate the effects and reduce the incidence of bullying, should
comply with the Implementing Rules and Regulations of the Anti-bullying law of 2013 to address

Technology in Teaching and Learning I ECQ 2020 6


the root causes of bullying. And the important ones, aside from the reporting requirements, are
as follows:

1. Schools to have prevention program that is comprehensive, multi-faceted, and shall


involve all education stakeholders and personnel. This may contain:
a. Positive school climate/environment
b. Periodic assessment and monitoring of bullying behaviors
c. Periodic review of manual of conduct for both students and personnel, in
relation to bullying
d. Activities on the issue for students, personnel and service providers
e. Personnel development
f. Coordination with LGUs and other stakeholders
g. Classroom initiatives
h. Activities involving parents
2. Schools to have intervention programs to ensure continuity of policies. These may
include:
a. Activities
b. Corrective and preventive, rather than punitive, measures
3. Students have a duty to intervene to protect the victim, unless the same jeopardizes
their safety/security
4. The Child Protection Committee (CPC) established by DepEd Order 40 shall also be
the Anti-Bullying Committee
5. Composition of Committee:
a. School Head/Admin-Chair
b. Guidance Counselor/Teacher-Vice Chair
c. Rep of teachers designated by faculty
d. Rep of parents as designated by PTA
e. Rep of students, except in kinder, as designated by student council-optional for
private schools
f. Rep from community as designated by Punong Barangay, preferably from the
Barangay Council for the Protection of Children (BCPC)
6. Jurisdiction for complaints of bullying and other acts under the IRR: exclusive: DepEd
or private school and not subject to barangay settlement
7. Procedures must include:
a. Immediate responses-ANYONE who has personal knowledge must immediately
call the attention of ANY school personnel
b. School personnel once notified is expected to intervene:
• Stop the bullying immediately
• Remove students from harm and provide medical attention if needed
• Bring the bully to the Guidance Office or designated personnel
8. Anonymous reporting to be entertained
9. Person reporting to be afforded protection
10. Fact-finding and documentation:
• Designated school official to:
• Interview parties involved separately

Technology in Teaching and Learning I ECQ 2020 7


• Assess threat level, devise intervention strategies
• Inform parents of both parties of the steps to be taken
• Make recommendations to CPC
11. CPC to determine the intervention programs for parties involved.
12. Schools may refer parties to trained professionals outside the school
13. Disciplinary measures must be according to nature, gravity of the bullying and
attendant circumstances
14. Due process must be observed
15. Community service may be a form of punishment if the same is in the rules and
regulations of the school
16. CPC supervises the intervention programs
17. On due process:
• Student and his parents to be informed IN WRITING of the complaint
• Student to be given the opportunity to answer with assistance of
parents/guardians
• Decision of the school head shall be IN WRITING, stating the basis thereof
• School head’s decision may be appealed to Division Office of DepEd
18. False accusation of bullying also to be sanctioned
19. Bullying incidents are confidential and breach thereof by school personnel is
likewise sanctioned
https://www.stopbullying.gov/cyberbullying
https://www.lawphil.net

E. Netizens in Cyberspace
As defined by Merriam Webster dictionary, NETIZEN is an active participant in the
online community of the Internet.
When we plug into the internet or the cellular networks, we instantly become full-
fledged members of a worldwide community. We will have instant access to every other person
who is also wandering around in that world. Immediate access, physical distance and the
perceived anonymity of the cyber world may cause humans no end of trouble.

To be a good cyber citizen, we need to know what that actually means. Citizenship is the
rights, privileges and duties conferred on a member of a society. It most often includes both
protections (e.g., the Bill of Rights) and duties (e.g., obeying the law, contributing to the
community). Cyber citizenship is the rights, privileges and responsibilities required of internet
and cellular network users.

A. Cyber Rights

Cyber citizenship is based on the general concept of citizenship but differs in a couple of
ways. First, there are no real “rights” you have as a cyber citizen other than the legal
protections you already have as an actual citizen. Moreover, some of those are not available
due to the global nature of the cyber world. Nevertheless, every citizen of the cyber world

Technology in Teaching and Learning I ECQ 2020 8


should have the right to respect, privacy and their own opinion. We have the right to
privacy.

While the cyber world does not have a bill of constitutionally protected rights, we should
still be required to respect certain unalienable rights:

• Life: Right for fair and reasonable treatment online. In the cyber world, the right to life is
primarily about being treated in a civil and respectful manner. This means interacting with
people in a considerate, tolerant and appropriate way. This right also includes freedom from
threats to life or person-hood.
• Liberty: Right to basic freedoms. Respect for online freedom should be similar to those
enshrined by our constitution, especially the Bill of Rights. We should respect and expect
privacy, safety and equal treatment regardless of sex, religion or sexual orientation. We
should also honor other’s property.
• Pursuit of Happiness: Right to explore personal interests without undue interference.

B. Cyber Privileges

It is a privilege to have access to the internet. It is a privilege to have the technology that
allows us access to the internet and cellular networks.

C. Cyber Responsibilities

It is a privilege to have access to the internet. It is a privilege to have the technology that
allows us access to the internet and cellular networks.

Responsibility is really at the heart of cyber citizenship. To be responsible, we need to be


informed about the cyber world. We also need to know about how to remain safe and
protect ourselves online. Another area of responsibility is to obey the law and we are
responsible for being considerate and well-mannered citizens.

Cyber citizenship is probably more accurately characterized as civil behavior. There are
certain ways civilized human beings should behave toward others.

D. Laws
The most important area of respect we should demonstrate as a cyber citizen is for the law.
There are several legal issues related to online activity. The first is intellectual property
rights. This includes the written word, ideas and products like music. If you download music
without paying for it, you have violated the property rights of the artist.

Technology in Teaching and Learning I ECQ 2020 9


E. Cyber Stalking
Another area that has legal protections is cyber harassment and bullying or cyber stalking.
Threatening, harassing or intimidating someone through electronic means violates that
person’s rights to be free from harassment.

Pornography also is regulated by law. For the most part that means ensuring that it is not
child pornography. Most other forms of pornography occupy a grey area that is in part
protected as free speech and in part whether it violates community standards of decency.
This pretty much means it is unregulated. A more recent aspect of pornography is what has
been called revenge porn. For people over 18, a slimy former partner or, as likely, someone
who has hacked your kid’s account, may provide nude images to sites that solicit this kind of
material. It can be done without the consent of the person in the images.

Making creating a false web sites under another person’s name and otherwise using their
personally identifying information is both a state crime.

F. Cyber Crimes
So, here is a summary of things that are against the law:

• Copyright infringement
• Plagiarism
• Downloading songs you didn’t purchase
• Profiting from others’ creative efforts or products
• Bullying and harassment
• Child pornography (including sexting)
• Internet stalking
• Identity theft

G. Cyber Identity
There are a range of ways we can be identified and recognized online. It starts with the
online names we use for various accounts as well as our online addresses (e.g., email,
texting number, social media accounts, etc.). Then, there are the more traditional forms of
identity such as name, home town, school they attend, home address, or phone number.
We may also be identified by their date of birth and social security number. Each computer
or device that accesses the internet or cellular network has a unique IP address that can be
used to identify that device (and potentially the user of that device). Finally, we can also
establish a cyber identity through credit and debit card numbers used to make online
purchases.

Technology in Teaching and Learning I ECQ 2020 10


H. Cyber Foot-printing
Every time we go online or transmit anything over a cellular network, we leave a trace of
that activity. This is known as a cyber footprint. There are generally two kinds of cyber
footprints. The first is an intentional footprint; things they have knowingly posted or entered
online. Consider this something like putting your shoe prints in wet cement that dries into a
permanent trail. Intentional footprints include things like:

• Photos
• Videos (e.g., Youtube, Vimeo, Vine, Skype, Facetime)
• Texting
• Social media accounts (e.g., Facebook, Twitter, Snapchat, Chatroulette, blogs like
Tumblr)
• Comments posted on other sites
• Emails
• Tagged photos on other user accounts
• Apps (e.g., Pinterest, Snapchat, Instagram, Zoom, Tiktok)
• Purchases and other transactions
Then, there are unintentional footprints we leave in cyber space. Unintentional footprints
include such things as cookies, search engine metrics and social media tracking.

I. Cyber Property
Anything that is posted online automatically becomes the copyright protected product of
the creator. This includes music, photos, videos and written material.

Example:
The creator of these products doesn’t have to formally register it with the US Office of
Copyrights or with the United States Patent and Trademarks Office. Use of these products,
particularly for monetary gain, requires permission of the copyright owner.

J. Relational Aggression
The internet and cellular networks can be used to express frustration, anger and cruelty to
other people. The most common form of relational aggression is represented by insensitive
comments, crude and awkward remarks or attempts at playful humor. The inability to read
the nonverbal social cues when making or receiving playfully insulting or sarcastic remarks
can result in misunderstandings about the real intent of the remarks or the reactions of the
recipient.

Technology in Teaching and Learning I ECQ 2020 11


Cyber communication can also be used to intentionally bully, intimidate, harass or
threaten other people. Through speaking directly online to another person or by using the
social networks to speak about another person, the internet provides another forum for the
age-old attempts to be mean and cruel to another person. It is also a means through which
someone can act to harm another person by sending malicious programs to damage their
hardware or software. It is possible to steal content from someone’s computer that can be
used to try to embarrass or humiliate them. And, most disturbingly, it is possible to use
technology to create false images and information that is then attributed to the target of
the aggression.

https://ualr.edu/itservices

F. Netiquette
Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in
society, netiquette is a code of good behavior on the Internet. This includes several aspects of
the Internet, such as email, social media, online chat, web forums, website comments,
multiplayer gaming, and other types of online communication.

While there is no official list of netiquette rules or guidelines, the general idea is to respect
others online. Below are ten examples of rules to follow for good netiquette:

1. Avoid posting inflammatory or offensive comments online (a.k.a flaming).


2. Respect others' privacy by not sharing personal information, photos, or videos that
another person may not want published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or
annoying them.
6. Stick to the topic when posting in online forums or when commenting on photos or
videos, such as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break
the cycle with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.
The Internet provides a sense of anonymity since you often do not see or hear the people
with whom you are communicating online. But that is not an excuse for having poor manners
or posting incendiary comments. While some users may feel like they can hide behind their
keyboard or smartphone when posting online, the fact is they are still the ones publishing

Technology in Teaching and Learning I ECQ 2020 12


the content. Remember – if you post offensive remarks online and the veil of anonymity is
lifted, you will have to answer for the comments you made.
In summary, good netiquette benefits both you and others on the Internet. Posting a positive
comment rather than a negative one just might make someone's day.

https://techterms.com/definition/netiquette

G. Educational Sites and Portals

Educational websites can include websites that have games, videos or topic related
resources that act as tools to enhance learning and supplement classroom teaching. These
websites help make the process of learning entertaining and attractive to the student,
especially in today’s age.

While there are many advantages of such websites, we also need to be aware of the
negatives. Students need to be guided properly. Without proper guidance, students may find
resources and content that are not reliable or do not align with the direction of the teaching
in class. Some websites are huge and offer a massive variety of games and resources.
Students may be easily distracted on such websites and end up spending time on activities
that are either below their level or do not complement or add to the classroom teaching.
Unrestricted access and freedom on the internet can be dangerous, especially for younger
students.

Here are some examples of educational websites:


1. EdX: edx.org. ...
2. Academic Earth: academicearth.org. ...
3. Internet Archive: archive.org. ...
4. Big Think: bigthink.com. ...
5. Coursera: courser.org. ...
6. Brightstorm: brightstorm.com. ...
7. CosmoLearning: cosmolearning.com. ...
8. Futures Channel: thefutureschannel.com.

Technology in Teaching and Learning I ECQ 2020 13


Technology in Teaching and Learning I ECQ 2020 14

You might also like