Anda di halaman 1dari 7

EDU3105

T12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL TECHNOLOGY

TOPIC12

ISSUES AND CURRENT TRENDS IN EDUCATIONAL TECHNOLOGY

SYNOPSIS This topic discusses and review issues and current trends in educational technology, covering technologies used in the classroom and outside the classroom that help in teaching and learning environment. Moreover, this topic also touches on the latest trends supporting the development of technology-based learning technology, media, education and training in the future. LEARNING OUTCOMES By implementing the learning activities, hopefully will be able to: i. Explain the concept of Copyright, Security, Privacy and Self-Regulation; ii. Describe issues related copyright, Security, Privacy and Self-Regulation; iii. Explaining the recent trends in educational technology in teaching and learning.

TOPIC FRAMEWORK Copyright Confidentiality

Issues and current Trends in Technology Education

Safety

Self Regulation

EDU3105

T12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL TECHNOLOGY

Think What is Copyright? How Copyright can be applied in computer-based education? What is the proper ethics in using the materials available in teaching and learning without violating the copyrights? 12.1 Copyright Copyright is an exclusive right granted by law to the creator / recipient's to control reproduction or utilization of various forms of the invention for certain period. Copyright is based on the premise that the creators have 'ownership' of their creation. Copyright law provides a legal monopoly protection to those who create the idea or knowledge. It also empowers the exclusive monopoly to the creator or owner of the intellectual property, lawfully vested in the law of their creation, to prevent others from making or using the invention without permission. There are four laws of intellectual property rights; i. Copyright law: control the purity of one's work; ii. Patent law: control new discoveries and the process of discovery; iii. Trademark law: control word, name, symbol, used by operators engaged in manufacturing to identify products and services; iv. Trade secret law: Control information that is not generally known but kept secret by the owner. Among controlled under copyright law are literary, musical, artistic works, films, sound recordings, broadcasts and publications. Copyright sign contains three important elements: the symbol or the word "Copyright" or "All Rights Reserved", the first year of publication, and the name of the copyright owner. Ways to get the materials for the development of multimedia software without violating copyright are: i. ii. iii. iv. Obtain the right to use material that has copyright; Using materials that do not have the exact copyright status or public domain material; Build or create the material by oneself; Obtain contract or agreement for the use of the original material.

Think What are the implications related to the security and privacy of students in the school? What is the teacher's role in security and privacy issues?

EDU3105

T12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL TECHNOLOGY

12.2 Safety In education, more emphasis is given on safety aspects. It is the responsibility of school administrators to provide a safe learning environment. Teachers play an important role in supporting the welfare and safety of students, when teaching and learning takes place in the computer labs and technology rooms. Adherence to safety rules while in the labs and technology rooms must be practiced and observed by each user. Since each room and computer lab are equipped with the available technology and electrical and electronic equipment, personal safety and security aspects of the laboratory equipment and the room needs to be preserved. Computer hardware, such as monitor, keyboard, mouse, audio system unit, printer, overhead projector etc. should be treated with care. Similarly, the hardware technology such as televisions, audio systems, video recorders are have to be cared for and maintained. When using computers and technology with high voltage electricity, safety precautions should be taken during the use in order to avoid the risk of electric shock. Thus, the frequency of maintenance of computer equipment should be done, especially the cables. Possibility of short circuiting could cause fire, thus will damage computer equipment. Data security in the computer should be taken care by backing up data in the hard disk, floppy disks or other secondary storage devices. The aim is to secure a copy of the original file if the original files are corrupted or damaged by viruses. Several studies have shown that continuous use of computers can cause health related disturbances such as headaches, muscle tension and bone (especially the shoulders, wrists, neck, back, and below the waist), red eyes, running nose, and sight. Thus, the position of the body, computer equipment and lighting in the lab space / room can affect the comfort and security of computer users. Preferably a computer screen should be 15 to 30 degrees to eye level and distance between eyes and the screen should be between 40-70 cm. Stretch out the body frequently to reduce muscle tension. Move around the room to view lab / room to relax the eyes. To ensure long endurance of computer systems, equipment should be clean and dust-free and placed in room that is not hot or too humid and stable table level. Table size should be appropriate to put a computer. The distance between the computer and the wall should be suitable for air circulation. In terms of safety, users are encouraged to clean video display device or monitor screen with a non-corrosive liquids. The best way is to wipe the screen with a wet cloth. Computer monitors generally use the resolution of the picture (CRT), which can cause emission of high light density not acceptable to the human eye retina. Therefore, the screen display should have anti radiation screen, so that the eyes can be shielded from the damaging effects of light from computer rays radiation. The keyboard should also be taken care of by reversing the keyboard to remove dust. The key gaps should also be cleaned. Among other issues related to the safety of ICT are: Fraud 3

EDU3105

T12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL TECHNOLOGY

Damage / Program Modification / Computer Data Information Theft Copying illegally Espionage Cyber Gaming Quick Rich Schemes Pornography Hackers Virus Diffuser

Thus, learning educational technology in computer labs and technology rooms which are equipped with electronic equipment should be protected by regulations for safety in order to maintain life span of equipment and to enable effective teaching and learning to takes place. 12.3 Confidentiality Confidentiality which is associated with technology is the care and preservation of the confidentiality of technology information of "material", device or object, written materials (such as topographic maps, plans, models, graphs, drawings), and the material / device that contains voice (such as tape recorders), film, negative or devices that contain images that can be produced, augmented or reproduced. It is understood that the low level of secrecy would create a conflict of privacy values and confidentiality. Cryptographic techniques are often used to safeguard, store and preserve digital information secret. The values of confidentiality should be preserved, especially in the use of communication tools such as a personal computer where the information in terms of financial status, insurance, health and shelter are kept secret from certain parties who may be able to use it for personal gain. These secrecy values are threatened due to the rapid development of communication tools in terms of data, images or graphics transmission by e-mail. Thus, each user of information and communication technologies should be more careful and responsible in collecting, analyzing and reviewing the information and material received because careless users will result in a secret spread to irresponsible party. This will undermine the security and reputation of individuals, communities and countries. In the management and administration of an organisation or country, information technology is used to build and maintain the confidentiality of the development to the public or government. The technology built with secrecy features are exercised through law enforcement practices, regulations, licensing and administration enforcement practice. In conclusion, in order to protect safety and national organizations, individuals or groups who are responsible for collecting, reviewing, analyzing and evaluating the data / information should consist of those truly responsible, trustworthy and honest. If not, negligence can have catastrophic consequences to the organization or country. In this regard, education as the pillar of the country must emphasize confidentiality and preservation technology proficiency so that students can build strong mental strength, thus not be easily influenced by negative elements.

EDU3105

T12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL TECHNOLOGY

Think There are some services available on the Internet, such as email, chat, newsgroups, bulletin boards, and so on. As a teacher who adhere to the procedures and ethical use of the Internet Explain,how do you protect your privacy so that all of your information cannot be easily compromised? 12.4 Self-Regulation Self-control is a self-effort or requirement on the behavior, actions and thought processes. Self-regulation refers to a person's ability to emphasize the sense of self power against all obstacles that block its action. Actually from childhood, children are trained to self regulate. However, experience and exposure to various media can influence and reduce the capacity of students to self-regulate effectively. In the age of information and communication technology development, each individual should have the self-control on their own actions. We have a responsibility to manage and use technology well to achieve balance and integrity as a member of the family, the community and the citizens of Malaysia. All access to information and printed materials, as well as the media is a privilege and not the rights. Therefore, every individual should follow the procedures and ethical use of materials and technology. Each user of technology and information should have self-responsibility and self control. While surfing the web, someone should be able to control yourself from surfing the material that may violate the law or code of ethics and self-discipline. Priorities of balance, integrity and quality of life as citizens, community members, students and employees should be maintained. Technology now gives individuals a variety of exciting challenges, opportunities and desire. Electronic data is now readily available on computer, whether in the form of digital video, music, text and other images. Consumers should be careful and self-discipline when downloading material in order not to break the rules or by-laws outlined. 12.5 Current and Future Trends of Educational Technology Electronic learning This type of learning is also known as e-learning. This development is an alternative facility to communication of information electronically to all students outside the formal classroom. With this development, an educator can contact and educate small group of children, but the number to be trained are many. Internet and computers is the main resources to implement e-learning because the computer is connecting to the internet tool that contains a wealth of information useful to students and teachers, particularly with the acquisition of information on research activities, publications and learning on the increase. Through e-learning, information sharing can be more effective and promotes information and communication technology in education. Pupils not necessarily acquire material from 5

EDU3105

T12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL TECHNOLOGY

textbooks, but can access the website. In addition, a CD-ROM with elements of animation, games, text and graphics that allows learning to be fun and interesting. With the implementation of e-learning, it can help teachers who are unable to deliver lessons for some reason. Pupils can be taught from the e-learning modules via the Internet or CD, as well as helping to develop the potential of students in browsing information for learning solutions and to fulfill their curiosity. Traditional media is still relevant Smaldino et al. (2005) have stated that many teachers would like to forget the traditional media and focus on new technology. However, this reasoning is incorrect. The educators should continue to use traditional media as the media type is more beneficial than new technologies. The important thing is that teachers should be wise in choosing the variety of existing media to stimulate learning.

For example, many classrooms still use chalk board or white board. Similarly, the overhead is still used as effective teaching aids to attract and retain student attention despite the addition of digital technology and computers. Textbooks and printed materials is the most popular teaching tool. Changing Role of Teachers The teacher's role in learning is changing with the increase in the use of technology in the classroom. Although the teachers cannot be taken over by technology, but the role of the teacher has changed from a provider of information to a coordinator of learning resources. In addition, teachers will be facilitators, managers, and the driving force which assisted students with ways to find and process information from various sources. Teacher no longer looking at class as a collective group, but rather look to at different group of individuals capabilities, abilities and needs. Consequently, teachers are able to identify individuals who need special counseling. Today, teachers guide students along the lesson and not as a presenter on stage. With this, the demand for teachers with computer skills has increased. As such, it is important for teachers to be skilled in the use of electronic devices in order to facilitate students and to maintain interest in students with various types of teaching media.

SUMMARY This chapter describes the issues related to copyrights, security, confidentiality, and selfcontrol in the use of educational technology in teaching and learning. In addition, this paper also discusses the current trends in educational technology closely related to learning.

EDU3105

T12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL TECHNOLOGY

REFERENCES Dick, N., Carey, L. & Carey, J. O. (2005). The systematic design of instruction. Edition of 6. New York: Pearson, Allyn and Bacon. Johnson, D.L., Cleborne, D.M. & Liu. (1997) Using Technology in the Classroom, New York: Haworth Press. Ministry of Education, Copyright, accessed on June 27, 2008. from [http://www.moe.gov.my/bbt/pengurusanhak cipta.php] Legal Research Board 2001. Copyright Act 1987 (Act 332) & regulations & orders, Kuala Lumpur: International Law Book Services. Norasiah Abdullah, Nor Risah Jamilah FAQ & Rosnah Mat Zain Ahmad (2009). Technology in teaching and learning. Selangor: Multimedia. Noriati A. Rashid, Boon, P. Y., Fakhriah Sharifah Syed Ahmad, & Wan Kamaruddin Wan Hasan (2012). Technology in teaching and learning. Shah Alam: Oxford Smaldino, S. E., Russell, J. D., Heinich, R., & Molenda, M. (2005). Instructional technology and media for learning. Edition of 8. New Jersey: Pearson Prentice Hall Smaldino, S. E., Lowther, D. L. & Russell, J. D. (2012). Instructional technology and media for learning. Edition of 10. Boston: Pearson. Willard, N.E. (2002). Computer ethics, etiquette & wafety for the 21st CenturyStudent, International Society for Technology in Rducation, Eugene,

Anda mungkin juga menyukai