Sunday, December 23, 2018
'Ethics in ICT Education: Utilizing Mobile Gadgets in Teaching and Learning Process Essay\r'
'In a engineering science-driven and digital ball club, getting training cursorily is important to both instructors and students. The expansion and all(prenominal) daytime use of reading and conversation technologies (ICTs) take up make it possible to quickly and instantly find cultivation, shargon ideas among comrade groups, release instructors to easily interact with their students, and add them with enabling platform for research and exploring impudently ideas. According to FBI- lucre Crime guardianship Center, Nigeria bedded third in the world later US and UK, in mesh behave unsound activities. Yet, in that location is no cyber tribute natural law to checkmates these restorations locally.\r\nThus, g eitherwherenment should work closely with the ICT fraternity (NCC, NITDA, NigComSat, Galaxy backbone,Telecoms firms, and Consultants), in conjunction with licit confederation, to reenact confiscate cybercrime laws. The write-up, bring to lilting the import ance and application of fluid gadgets in learning touch, issues associated with development prompt devices and ship keisteral to combat them. Keywords: digital ships company, learning, students, instructors, development, prompt gadgets.\r\n inception:\r\nMobile gadgets and head shouts trtype A be a double-edge sword; the two stack be utilize as a tooth root of many benefits, for instance, the ease with which digital discipline arse be analyzed, transmitted, and shargond among many muckle and groups. On the some other hand, they tail be use to create ship tushal of breaking laws or taking benefits aside from others. For ex angstromle, sending unsolicited e-mails is one of the practice honourable issues raised by coetaneous alert gadgets drug users. Generally, reading and communicating engineering science (ICT) and the apply of fluid gadgets be apply for the good of gentlekind; however it can in addition be abused and used as a tool for felony (L& a denosine monophosphate;N Long, 2005). Thus, the growth of prompt gadgets take a shit generated intense controversy and raised austere issues virtually information and conversation engineering ethics. An ethical singular accepts and lives by a curry of clean-living principles and values.\r\nThese principles define what is amicablely accepted as ââ¬Å"goodââ¬Â and on the other hand what is ââ¬Å"badââ¬Â, until straight aside society continues to raise questions about what is or non ethical in the used of information engineering science gadgets. These issues be so important to our society, to the extent that educators see it as core subject that shall be structured into college curricula. Educators believe that, if members of the society ar made aware of the consequences of their actions, then there would be still fewer(marginal) people that allow for be motivated to commit com giveer crimes, infect systems with false information, post pornographic corpore al to the internet, or abuse sanctity of understanding keeping (K & adenine; J Laudon, 2003). .\r\nEthics, Education, and information and Communication Technology (ICT): Ethics in information engineering science ââ¬Å"can be specify as the moral conducts and determinations confronting individuals, groups or institutions engaged in information and communication technology (ICT) practices (Martin M. 2009). It could also be defined as the probe of moral ideals, character, policies and relationships of people and institutions involved in the activities of information and communication technology (Martin M. 2009). Whereas; developmental technology is the study and ethical practice of facilitating learning and astir(p) performance by creating, use, and managing fascinate technical processes and resources (AECT, 2004). Conversely, information and communication technologies (ICTs) can be defined as a eagerness of technological tools and resources used to communicate, create, dis seminate, store and execute information.\r\nThese technologies include internet, tablet data processors, smart phones, and publicise technologies such as radio and television receiver (Kukulska-Hulme et. al. 2005). The use of ICT ( wide awake gadgets and phones) for a avow of contrary learning processes has been the prime concern of any right-thinking individual in this era. It is realized that, sprightly gadgets and phones could add a completely young dimension to the tenet and learning process due to a wide range of attributes, such as being portable, ubiquitous, pervasiveness and the functions such as voice, delineation and data serve, camera, video, radio, and the internet connectivity (Kukulska-Hulme et. al. 2005). Besides, Bressler, D, et.al. (2007) states that youth should be the target and frontmost priority user group of mobile based teaching and learning, because research showed that teenagers and college students wipe out a naughtyer interest in e very mo bile phone operation than any other age group. enquiry Questions:\r\nThis text endeavor to address the followers questions raised by mobile gadgets and users: I. What ethical, gateible, and indemnity-making issue arises by the uses of mobile technology gadgets? II. What are the specific commands of conduct that may be used to guide decision about cybercrime? III. Why do coeval mobile gadgets pose challenges to the rampart of individual rights and intellectual position? IV. How do mobile gadgets affect everyday keep of instructors and students? V. How could mobile gadgets allow continuous coming to program line and reach marginalized groups of a society? RQ1-What ethical, cordial, and semi semipolitical issues arises by the uses of mobile technology gadgets?\r\nEthical, social, and political issues are closely linked together. The ethical dilemma we may face in our academic system typically is reflected in social and political settings of the society (K & J Laudon , 2003). Letââ¬â¢s figure our society, in which we are all documentation before the advent and penetration of mobile gadgets as a calm pond, an ecosystem in partial derivative equilibrium with individual, society, and political institutions. down the stairs this condition, everyone knows how to act in this pond because social institutions (family, colleges, polytechnics, universities, and organizations) bewilder developed well up-honed rules of behaviors and these are plunk for by laws developed in the political zone of the society that stipulate mixed do and promises appropriate penalty for rapine any of the l attend to down insurance policy and guiding principles.\r\nNow, information technologies development tosses a rock into the pond. The forces and pulsation as a result of tossing rock (mobile gadgets evolution) into the ponds, which is a potent shock of new information technology revolutions that hit our social systems which is much or less (at rest or partial e quilibrium) and gum olibanum generates positive and minus pulses. Suddenly, individuals, and society are confronted with new situations often not covered by the old laws (rules and polity of conduct of the nation). The figure below portrays moral dimensions that connect ethical, social and political issues (K & J Laudon, 2003). Figure 1: chaste Dimensions (Ethical, Social, & Political) Issues Related To Mobile Gadgets:\r\n remove from: prerequisite of Management Information Systems, ordinal Edition.\r\nInformation /Property rights and obligations: what information rights do individual or institutions posses with respect to the information about themselves? What can they protect? How leave traditional intellectual appropriatety be protected in a digital society in which accounting of willpower is difficult? Accountability and Control: who will be held responsible and liable for the injury done to individual, institutions and collective information and property right s? System and Life Quality: what services should we demand to protect individual rights and the recourse of the society? What services and practices are back up and accepted by the society?\r\nRQ2- What are the specific codes of conducts that can be used to guide decision about cybercrime? Cybercrime can be referred to as the use of mobile gadgets or computers and internet to commit extracurricular act. Cybercrime (computer assisted crime) includes e-mail scams, hacking, distribution of belligerent software (viruses and worms), denial of service(DoS) attacks, theft of data, fraudulence and impersonation, online auction fraud, phishing, child pornography, espionage (theft of trade secrets), cyber black-market and so on (Uwaje Chris, 2009). With the proliferation of mobile gadgets that allow easy recover to internet and online resources, it arrives more(prenominal) disturbing because the cyber s curtilage, by dint of which these crimes are perpetuated, is not defined by pol itical or geographical boundaries, thus enacting or amending laws to fit them go aways a challenge.\r\nAccording to FBI-Internet Crime remonstratet Center (IC3 report, 2009), Nigeria ranked third in the world after US and UK, in internet fraudulent activities. Yet, there is no cyber security law to checkmate these issues locally. Similarly, Ewelukwa (2012), lamented that various legislative bills before the matter Assembly, aimed at preventing cybercrime, deem been neglected by the lawmakers including ââ¬Å"The calculator Security and Critical Information al-Qaida Protection billet 2005 sponsored by the executive failed to be make do law (Ewelukwa, 2012).\r\nEwelukwa (2012) further give tongue to ââ¬Å"Other related legislative bills that have not yet been passed by the National Assembly include the Cyber Security and data Protection Agency (Establishment, etc) Bill 2008, electronic Fraud Prohibition Bill 2008, Nigeria information processing system Security and Protect ion Agency Bill 2009, and the Computer Misuse Bill 2009. Cyber security entails all measures taken proactively to prevent and interpret safety from cyber attacks and related crimes. Cyber attacks vary and grow on daily basis with advances in ICT gadgets.\r\nTherefore, government should work closely with the ICT alliance (NCC, NITDA, NigComSat, Galaxy Backbone, Telecoms firms, Experts and Consultants), legal community, to enact appropriate cybercrime laws, and expedite action to signboard the said(prenominal) bills into laws. Thus, would boost the nationââ¬â¢s two-base hit before the online community and globally.\r\nRQ3- Why do contemporary mobile gadgets pose challenges to the protection of individual right and intellectual property? Ethical issues have long preceded the evolution of information technology, they are the abiding concerns of every society everywhere on earth, nevertheless, information technology has raised and heightened ethical concerns, put stress on exist ing social arrangement, and made existing law archaic or severely crippled. There are three key technological trends that are responsible for these ethical traumas (K & J Laudon, 2003): I. Increases in Computing Power: day-to-day people are getting willpower of different mobile gadgets for their day to day undertakings (research works, handicraftes, leisure and entertainment), due to invention of high powered gadgets with varieties of features made available by the manufacturers.\r\nII. Advancement in Data abridgment & Declining Data Storage be: it is clear that with contemporary information systems technology and data analysis techniques, one can assemble and combine myriad pieces of information about an individual much more easily than in the past. For instances, information about an individual such as identification card purchases, telephone calls, magazine subscriptions, video rentals, mail order purchases, banking records, local, state, and federal governments(in cluding mash and police records), can all be gathered and mined properly. III. Networking and advances in Internet: sharing and accessing mammoth quantities of data over the internet, open the possibility of mining large pools of data remotely utilize mobile gadgets, and thus permitting the invasion of privacy of others.\r\nRQ4- How do mobile gadgets affect everyday life of instructors and students? ICT and mobile gadgets in schools, colleges and universities have moved(p) everyday life of both instructors and students, either in positive or negative directions as pointed out below: Students can record homework and assignments on their phone calendar. Help instructors to monitor their lecture schedules.\r\n engage of camera functions in geography and tangible sciences subjects to records things and report back to class. around instructors learn to teach in different ways with an emphasis on independent study, and thus incorporated mobile gadgets in their lessons. breakage during lectures in cyber- bullying one some other using text and blackberry messaging(BBM) spiteful comments or spreading malicious gossips.\r\nSome students used mobile gadgets (for fashion) to chase foe sexes\r\nRQ5- How could mobile gadgets allow continuous access to education and reach marginalized groups of a society? It would be very difficult or impossible for the conventional (class-room) delivery mode of education to provide continuous and educational opportunities for majority members of a society. ICTs and mobile gadgets have the answers and potential drop to overhaul reach this objective. They are portable, pervasive, personal, affordable, ubiquitous, and interactive and hence, instruction can be delivered anywhere and at anytime through it. Moreover, it is an aid to formal and informal learning, it supplement and amend formal schooling, make learning more accessible, personalized and flexible for students everywhere. And thus holds gigantic potential to transfor m the delivery of teaching and learning process.\r\nMobile devices can whip geographic, social, and infrastructure barriers to reach populations, and marginalized groups by providing them with access to further learning and development. These devices facilitate blank learning in situations where access to education is difficult or interrupted because of geographical barriers. And therefore, m-learning or mobile learning, cans modern ways to support learning process through mobile devices, such as handheld tablet computers, MP3/MP4 players, smart phones and mobile phones. And thus, a mobile gadget is not only a device, but a penetration to greater education and continuous interactive learning process.\r\nAdvantages of using Mobile Gadgets:\r\nStudents, teachers, and researchers have many reasons to consider using mobile gadgets, since these devices are one of the most varied electronics gadgets in the market today. Besides the limpid communication advantages, mobile phones have features, such as cameras and internet accessibility, that can help students and researchers in all aspects of their learning processes, from their studies to their social and professional lives and practices. cat Stafford (2013) stated in his write-up some advantages of mobile phone to college students, among which are: emergency communication, parental connection, studying and research, inhibit memories, social and professional networking and organization. Issues and Crimes Associated with Mobile Gadgets:\r\nAs cell phones have rapidly become ubiquitous in everyday life, the issue of cell phones in school has become a hotly debated topic. Many disadvantages also exist concerning student cell phone use, Rebecca Richards (2012), mentioned few such as: causes distractions, exams cheating, e-mail scams, pornography and cyber contraband.\r\nRecommendation:\r\nProvision of bare(a) internet services (both wired & wireless) in our various institutions of learning using technology such as WIFI, or WIMAX, to facilitate learning processes using ICT gadgets. Universities, polytechnics, COEs, and other institution of learning should use proper network administrative tools to police students over inappropriate use of services provided to them; it can equally ban and restrict access to ALL social networks that can cause distractions to their studies.\r\nUse of software tools like entanglement anonymizers (such as Psiphon, Surfola, Silent Surf, and Merletn) to hide user tracks from their predators. Every institution should review its code of conducts to include contemporary netiquettes, so that students and researchers are made aware of the cause of actions of every crime they committed. Likewise, at national level government should work closely with the ICT community (NCC, NITDA, NigComSat, Galaxy Backbone, Telecoms and IT firms, Experts and Consultants) and Legal community to enact appropriate cybercrime laws, and expedite action to sign all the legislative bills before them into laws.\r\n shutdown:\r\nWhile there are large benefits to be gained out of mobile gadgets in terms of m-learning, enrichment, portability and flexibility in using ICTs throughout formal educational systems, there is even greater value to be gained in using the mobile technologies to affix access to millions of instructional resources who are before long outside the educational footprints.\r\nA compounding of mobile technologies and relevant applications softwares, have the potential to overcome the barriers of time, distance, and allow adult education for those who have not been properly improve and now wish to be informed, well educated, trained or enlightened. It is apparent that ICTs offer opportunities not available previously to educators, using tools such as e-mail; Webinar, audio-video, computerââ¬conferencing, both synchronously and asynchronously. With aid of ICT and appropriate set of application tools, a very rich interactive and learning milieu c an be created that allows learners to dictate their pace of learning, or place of learning.\r\nWhile the ICT tools empower our communities, they need not take away the role of the instructors or research supervisors; instead, students, firms, researchers and instructors should come together for a common purpose, work collaboratively with clearly defined roles on a shared platform to attain the set objectives of any kind. These communities encompass all levels and sectors of human endeavor, from basic education to postgraduate studies, from teacher training to business studies, and from non formal studies to manner of speaking instruction, companies and research institutes. However, only infrastructure, fiscal resources, and policy support, would inhibit exploitation of this potential. And thus, an ICT world is an enkindle planet of continuous learning process.\r\nReferences:\r\nAECT (2004). ââ¬Å" tie beam for Educational Communications and Technologyââ¬Â Retrieved from: http: //ocw.metu.edu.tr/file.php/118/molenda_definition.pdf visited on 05-04-2013. Bressler, D, et.al.(2007). ââ¬Å"Information and Communication Technology in Education, Retrieved frm. http://www.schoolnet.lk/research/mobile_phones_for_teaching_learning_science/ visited on 07-05-2013. Ewelukwa (2012).ââ¬Â Wanted: A law on cyber securityââ¬Â Retrieved from: http://www.thenationonlineng.net/2011/index.php/business/35334-wanted-a-law-on-cyber-security.html , visited on 07-05-2013. IC3,(2009). ââ¬Å"Internet Crime Complain Center 2009ââ¬ÂRetrieved from: www.ic3.gov/media/annualreport/2009_ic3report.pdf , visited on 19-04-2013. Kukulska Hulme et.al .(2005). ââ¬Å"Innovation in Mobile Learning: a European Perspectiveââ¬Â Retrieved from : http://www.schoolnet.lk/research/mobile_phones_for_teaching_learning_science/ , visited on 19-04-2013 Kat Stafford, 2013).\r\nââ¬Å"Use of jail cell Phones and College Studentsââ¬Â http://www.ehow.com/list_5961606_advantages-cell-phones-col lege-students.html, visited on 07-05-2013. Laudon K.J, (2003). Essential of Management Information Systems, Fifth Edition, Chapter 5: Ethical and Social Issues in the Digital Firm, P. 142-143 Long L.N, (2005).Computers Information Technology in Perspective, 12th version, Chapter IT ethics, Crime, and Privacy. P. 278 Martin M. (2009).Ethics in Engineering, 3rd edition New Delhi: MC Graw-Hill P.2-3 Rebecca, Richards (2012). ââ¬Å"Use of Cell Phones and College Studentsââ¬Â Retrieved from: http://www.ehow.com/list_5961606_advantages-cell-phones-college-students.html, visited on 07-05-2013. Uwaje, Chris (2009). ââ¬Å"Cyber Crime: Its Implications for Internet channel Growth In Nigeriaââ¬Â Retrieved from: http://techtrendsng.com/cybercrime-its-implications-for-internet-business-growth-in-nigeria/, visited on 15-05-2013.\r\n'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment