Topic 12 issues and trends in ed tech

Post on 08-Jul-2015

61 views 0 download

Tags:

Transcript of Topic 12 issues and trends in ed tech

Issues And Current Trends In Technology Of Education

What you will learn:

• Discuss the issues and current trends in technology of education.

• Exhibit acountability, integrity and responsibility in the use of ICT.

• Discuss impact of latest trends in technology on the roles of teachers.

Copyright

• as the author of the work, you alone have the right to do any of the following or to let others do any of the following:– make copies of your work;– distribute copies of your work; – perform your work publicly (such as for plays, film,

dances or music);

Copyright

– display your work publicly (such as for artwork, or stills from audiovisual works, or any material used on the Internet or television); and

– make “derivative works” (including making modifications, adaptations or other new uses of a work, or translating the work to another media).

Copyright ©

Duration of copyright protection is dependent on a number of factors: nature of the work,

the time when it was made

whether it has been published.

Copyright

• duration of protection for copyright works that have been published (or otherwise made available to the public) generally lasts for 70 years after the death of the creator.

Internet Privacy

the ability to control what information one reveals about oneself over the Internet, and to control who can access that information.

Internet activities which reveal our personal information

• Signing up for Internet service

• Email and listserves

• Browsing the Internet

• Instant messages

• Personal web sites and blogs

• Managing your online accounts and bill payments

Ways to control Internet privacy

• Encryption• Setting the browser cookie file to be Read Only - the

cookies will only last for as long as your browser is running.

• Set up your computer to delete the cookies file whenever you start your browser.

• Many browsers allow you to set them up so that you are notified when a cookie is to be written to your computer.

• There are many software products you can get which will reject or manage cookies for you, these include Cookie Crusher , Cookie Pal and Cookie Cruncher .

Firewall

• a system that is set up to control traffic flow between two networks.

• works by blocking certain types of traffic between a source and a destination

Firewall – its functions

• examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped

• filters both inbound and outbound traffic

• It can also manage public access to private networked resources such as host applications.

Firewall – its functions

• It can be used to log all attempts to enter the private network and trigger alarms when hostile or unauthorized entry is attempted.

• Firewalls can filter packets based on their source and destination addresses and port numbers. This is known as address filtering.

Firewall – its functions

• Firewalls can also filter specific types of network traffic. This is also known as protocol filtering because the decision to forward or reject traffic is dependant upon the protocol used, for example HTTP, ftp or telnet.

Copyright

Governed by Copyright Act 1987 Copyright Amendment Act – responsible for copyright laws related to menghasilkan undang-undang hakcipta yang terkini sesuai dengan perkembangan semasa.

Cara untuk mengawal hakcipta penemuan atau produk baru :

mengisi borang memohon hakciptaMinistry of Domestic Trade and Consumer Affairs – mencari dan merampas bahan cetak rompak

Copyright

3 important parts:

Symbol ©, or

The word “Copyright”, or,

“Hakcipta Terpelihara”

Copyright

How to use materials for teaching and learning ethically without infringing the Copyright Act?

• obtain permissions for materials which are copyrighted

• To use materials which are not copyrighted or to use public domain material’ (Open Sources)

• Develop our own materials

• To obtain contract or agreement to use the original materials

Conditions under which you may use copyrighted materials:

• Not for profit purposes

• Purely for teaching and learning purposes

• Only a small part and not the whole piece of work is used

• Give credits and acknowledgement to the original creators/ authors

Security

Use of computer and Internet is exposed to various threats to its security

Some security issues related ICT:

cheating

Modification of data/ software

stealing of information

Security

Do not open any suspicious emails

Do not simply dispose any personal particulars, eg IC no., credit card no., phone no, etc. over the Internet

Set passwords whenever necessary

Some examples of regulations on the use of computer labs:- students must be accompanied by teachers in the lab - no food and drinks in the lab - no bags allowed in the lab - use computer with permission only

Hardware security

• avoid dusty places

• keep away from other electrical appliances/ magnet

• do not turn on computer for a long period of time

• follow the correct procedure to shut down computer

• Use of voltage regulators

Back up of data?

• Back up data in secondary storages, eg pendrive, Cd, external hardisk

• Keep data in server

• Keep data virtually, eg Google Drive,