KEMBAR78
Topic 2 | PDF | Educational Technology | Computer Network
0% found this document useful (0 votes)
97 views16 pages

Topic 2

This document provides guidelines for safety when using information and communication technology (ICT). It discusses ergonomic risks from prolonged computer use and the importance of taking breaks. It also addresses potential online risks students may face, such as exposure to inappropriate content, cyberbullying, and privacy issues. The document outlines minor misuses of ICT in schools and emphasizes the role of e-safety education. It proposes network management strategies in schools, such as password policies and regulating personal device use. Finally, it recommends safety practices for setting up an educational technology room, like providing adjustable furniture and ensuring adequate spacing between workstations.

Uploaded by

Shawn Bacani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views16 pages

Topic 2

This document provides guidelines for safety when using information and communication technology (ICT). It discusses ergonomic risks from prolonged computer use and the importance of taking breaks. It also addresses potential online risks students may face, such as exposure to inappropriate content, cyberbullying, and privacy issues. The document outlines minor misuses of ICT in schools and emphasizes the role of e-safety education. It proposes network management strategies in schools, such as password policies and regulating personal device use. Finally, it recommends safety practices for setting up an educational technology room, like providing adjustable furniture and ensuring adequate spacing between workstations.

Uploaded by

Shawn Bacani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

SAFETY GUIDE TO USE ICT

SAFETY ISSUES ON THE USE OF


ICT INCLUDING E-SAFETY RULES

Shawn Michael V. Bacani


BTLED 2B
Safety Issues:
What You Need to
Know
It’s probably not observed by a child or some adults
that this matter have a moderate to heavy impact to the
health that most of heavy computer use brings a
number of area at risk when it comes to health and
safety.
This lesson covers a wide range of
aspects of health and safety in the use of
ICT into the modern world including
ergonomic chairs, the safety positioning
of furniture and computer hardware,
cables, use of keyboard and mouse,
postures and need for break when too
much time exposure to computers, and
including a variety of exercises designed
to prevent injury.
Some Risks in the Use of
ICT and e-networking
Despite of so many benefits of the ICT to
teaching and learning theirs also negative effect
and influences to the learners.

As a future educator of our nation we have to be aware of


how to safeguard learners in the school community where
they spend most of their hours and also their homes,
school community that facilitate and provide opportunities
to use digital technologies like library and internet cafe.
Safeguard and protection should be the primordial role of
parents, teachers, and school.
Risks using ICT and E-network

1. Exposure to inappropriate content, including online pornography, extremism (exposure to violence


associated with racism and racist language).

2. Lifestyle websites including self-harms, suicide sites and hate sites.

3. Cyberbullying in all forms receiving sexually explicit images and/or messages.

4. Privacy issue including disclosure of personal information.

5. Health and well-being (amount of time spent online like internet gaming, movie marathon including
websites apps, and more).
Risks using ICT and E-network

6. Prolonged exposure to online technologies, particularly at an early age.

7. Addiction to gambling and gaming.

8. Theft and fraud from activities such as phishing.

9. Viruses, Trojans, spyware and other malware.

10. Social pressure to maintain online networks via texting and social networking
Minor Misuse
of ICT  COPYING INFORMATION INTO ASSIGNMENT AND FAILING
TO ACKNOWLEDGE THE SOURCE/S.

 Downloading material not relevant to their studies.


In schools, some minor misuse made by
learners include the following:

 MISCONDUCT ASSOCIATED WITH SUBJECT LOGINS,


SUCH AS USING SOMEONE'S PASSWORD.

 Leaving a mobile phone turned on during class period.

 UNAUTHORIZED TAKING OF PICTURE OR IMAGES.


E-safety
E-safety takes care not only for internet
technologies but also in electronics communication
via mobile phones. Here are some issues of e-safety:

 E-safety educates
 E-safety helps safeguard  E-safety emphasizes the
children about the risk as
children and young people learning to understand the
well as the benefits so we
in the digital world. new technologies in
can feel confident online.
positive way.

 E-safety support young learners and adult to develop safe online behavior, both in or out of
the school.
Network Management
Network management is defined as the process of
managing the network for fault and performance using
various tools and technologies to keep up with the
business requirements.

1. Safety in the use of network in schools

1.1. Make clear that no one 1.2. Require all users to 1.3. Maintain equipment
should log in as another always log off when they clean to ensure health and
user. have finished working. safety.
Network Management
1. Safety in the use of network in schools

1.5. Set up a clear disaster


1.4. Provide students with
recovery system in place
access to content and
for critical data that include
resources through guided
secure remote back up for
e-learning.
critical data.

1.6. Secure wireless 1.7. Install all computer 1.8. Review the school ICT
network to appropriate equipment professionally system regularly regarding
standards suitable for and meet health and safety health and safety and
educational uses. standards. security.
Network Management
2. Password Policy

Only authorized users will have individual passwords. Users are not permitted to disclose
their passwords unless they got permission from the owner or from the management.
The equipment that keeps the personal information shall be locked when unattended to
prevent unauthorized access. Computers should be set to a time out if they become
unused for a certain period time.
Network Management
3. Personal mobile phones and mobile devices

All mobile phones shall be kept in a box far to reach from the children or
learners it's only allowed to access at break time or at the end of
classes and when needed during the class period.
Setting up an Educational
Technology Room
Schools that plan to dedicate a room where the students can access
technologies for learning should include the following safety rules.

1. Provide tables, these tables 2. Provide anti-glare screen 3. Provide adjustable chairs.
can be tilted and adjustable to filters.
the height of the users.

4. Provide foot support. 5. Make sure lighting is suitable. 6. Make sure workstations are
safe and clean.

7. Create a work plan to the use of computer laboratory to maximize its use.
More safety rules that can reduce risk of accidents in the
working stations should include:

1. No trailing wires across or 2. Electrical sockets should 3. Electrical equipment should


around the room which not be overloaded. be safety-tested at least once
people can trip on. a year.

4. There should be an 5. Bags and obstacles 6. Food and drinks should


adequate space around should be stored out of the not be placed near
desk for people to move way. machines.
freely.

7. Heating and ventilation 8. Fire extinguishers should 9. Fire exists should be clearly
should be suitable for the be available. marked and free from clutter.
working environment.
Do you have
any questions?
Thank You
For Listening

You might also like