Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

RISKS ASSOCIATED WITH THE USE OF ICT IN

LEARNING
 The integration of Information and Communication Technology in education has transformed the
learning landscape, offering new opportunities for interactive and personalized learning. However, it
also introduces several risks that need to be carefully managed.
 The following are risks associated with the use of ICT in learning:

1. Overreliance on Technology
There is a risk that both students and teachers may become overly on technology, which can be
detrimental if the technology fails or is unavailable.
2. Distraction and lack of attention

Digitalization means opening up unlimited access to multiple resources and sources of information, such
as web pages, social networks or chats, and therefore, they take attention away from the subject
matter.
3. Addiction
4. It reduces the development of other skills
 Practices such as writing, public speaking and reasoning may be nullified by the widespread
adoption of digitalization in academic institutions. This has been demonstrated in a recent study
conducted by university of California . The report details that the social skills of the new
generations are based on the digital environment, therefore, direct personal communication can
be affected.
5. Cybersecurity threats
The use if ICT opens up the possibility of attacks and hacks, which can compromise both the privacy
and safety of students and educators.
6. Misleading and Misguiding Information
With the vast amount of Information available online, there is a risk of students encountering
inaccurate or misleading content.
7.Problems in schooling or working
Use ICT to complement, not replace, traditional teaching methods and ensure it aligns with
curriculum goals.
8. Reduces human contact
With the incorporation of new technologies, the learning process becomes more distant and the
physical relationship with teachers and classmates decrease. As a consequences, isolation can
appear and become an obstacle to students’ personal development.
9. Excessive impact
Excessive and inappropriate use can lead students to a compulsive relationship with technology,
which can lead to an inability to control consumption and consequently, have adverse effects on the
student’s health, social, family and academic life.
10. Ethical concerns
Issues such as plagiarism and the ethical use of digital content can become more prevalent with the
ease of access to information.
11. Accessibility Issues
Not all students may have equal access to ICT, leading to a digital divide that can exacerbate
existing inequalities in education.
SAFETY THREATS TO DATA STORED
IN A COMPUTER
 Data security threats is any action that could jeopardize the confidentiality, integrity or
availability of data.
 Data security is the practice of protecting organization data from risk.
 Data security threats include:

1. Hacking

Hacking refers to an unauthorized user gaining access to a computer or a network. There are a
variety of ways that hackers gain access to networks or computers-some as intricate as altering
a systems security, and others as straightforward as guessing a user’s passwords or installing a
keylogger.
2. Cracking
Cracking is reverse engineering of software , passwords or encryption could lead to
unauthorized access to sensitive information. This is another form of hacking.
3. Malware
Malware(short for malicious software ) disrupts computer operations, gathers sensitive information, or gains
access to a computer system to compromise data and information. Antivirus software and firewalls are
typically used to keep malware off of computers. Examples of malware include viruses, worms, spyware,
ransomware, keyloggers, and backdoors, but bin reality malware can be any program that operates against
the requirements of the computer user.
4.Misuse
Employees may take advantage of entrusted resources or privileges for a malicious or unintended purpose,
e.g administrative abuse , policy violations, and use of non-approved assets.
5. Errors
Errors such as system misconfiguration or programming errors can cause unauthorized access by
cybercriminals. Errors can occur in-house due to faulty programming, or hackers can find loopholes that
can cause errors as well.
6. Data leakage
Unauthorized electronic or physical transmission of data or information from within a company to an
external destination or recipient could leave data in the wrong hands.
7. Phishing
Similar to fishing in a lake or river, phishing is computer lingo for fishing over the internet for personal
information. Phishing uses link manipulation, image filter evasion and website forgery to fool wed users
into thinking that a spoofed website is genuine and legitimate . Once the user enters vital information, he
immediately becomes a phishing victim.
SAFETY MEASURE TO CURB THE RISKS AND
THREATS RELATED TO THE USE OF ICT IN
LEARNING
1. Make clear that no one should log on as another user.
2. Require all users to always to always log off when they have finished working.
3. Maintain equipment to ensure health and safety.
4. Provide students with access to content and resources through guided e-learning.
5. Set up a clear disaster recovery system in place for critical data that include secure, remote
back up of critical data.
6. Secure wireless network to appropriate standards suitable for educational use.
7. Install all computer equipment professionally and meet health and safety standards.
8. Review the school ICT system regularly with regard to health and safety and security.
9. Electrical sockets should not be overloaded.
10. Install antivirus software.
11. Set privacy settings. e.g passwords.
ETHICAL ISSUES RELATED TO THE USE OF ICT IN
LEARNING
1. Algorithms used in educational software should be transparent and the developers held accountable for their design and
outcomes.
2. Ensure the privacy of students and teachers is upheld.
3. Ensure all students and teachers access the technology.
4. Respect copyright laws and creation of content.

N/B: T o mitigate risks and safety threats to data storage in the computer, it is essential to implement comprehensive ICT
policies, provide adequate training for educators, ensure equitable access to technology , and foster an environment that
balances technological and traditional educational methods.
Additionally, promoting digital literacy and responsible use of technology among students is crucial for maximizing the benefits
of ICT in education.

THANKS!!

You might also like