Anda di halaman 1dari 7

T4 MT12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL

EDU3105

TECHNOLOGY
TOPIC12

ISSUES AND CURRENT TRENDS IN EDUCATIONAL


TECHNOLOGY

SYNOPSIS
This topic discusses and review issues and current trends in educational technology, covering
technologies used in the classroom and outside the classroom that help in teaching and
learning environment. Moreover, this topic also touches on the latest trends supporting the
development of technology-based learning technology, media, education and training in the
future.
LEARNING OUTCOMES
By implementing the learning activities, hopefully will be able to:
i. Explain the concept of Copyright, Security, Privacy and Self-Regulation;
ii. Describe issues related copyright, Security, Privacy and Self-Regulation;
iii. Explaining the recent trends in educational technology in teaching and learning.

TOPIC FRAMEWORK
Copyright

Confidentiality

Issues and current Trends in


Technology Education

Safety

Self Regulation

T4 MT12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL

EDU3105

TECHNOLOGY

Think
What is Copyright?
How Copyright can be applied in computer-based education?
What is the proper ethics in using the materials available in teaching and learning without
violating the copyrights?
12.1 Copyright
Copyright is an exclusive right granted by law to the creator / recipient's to control
reproduction or utilization of various forms of the invention for certain period. Copyright is
based on the premise that the creators have 'ownership' of their creation. Copyright law
provides a legal monopoly protection to those who create the idea or knowledge. It also
empowers the exclusive monopoly to the creator or owner of the intellectual property, lawfully
vested in the law of their creation, to prevent others from making or using the invention
without permission.
There are four laws of intellectual property rights;
i.
Copyright law: control the purity of one's work;
ii.
Patent law: control new discoveries and the process of discovery;
iii.
Trademark law: control word, name, symbol, used by operators engaged in
manufacturing to identify products and services;
iv.
Trade secret law: Control information that is not generally known but kept secret by
the owner.
Among controlled under copyright law are literary, musical, artistic works, films, sound
recordings, broadcasts and publications. Copyright sign contains three important elements:
the symbol or the word "Copyright" or "All Rights Reserved", the first year of publication, and
the name of the copyright owner.
Ways to get the materials for the development of multimedia software without violating
copyright are:
i.
ii.
iii.
iv.

Obtain the right to use material that has copyright;


Using materials that do not have the exact copyright status or public domain material;
Build or create the material by oneself;
Obtain contract or agreement for the use of the original material.

Think
What are the implications related to the security and privacy of students in the school?
What is the teacher's role in security and privacy issues?

EDU3105

T4 MT12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL

TECHNOLOGY

12.2 Safety
In education, more emphasis is given on safety aspects. It is the responsibility of school
administrators to provide a safe learning environment. Teachers play an important role in
supporting the welfare and safety of students, when teaching and learning takes place in
the computer labs and technology rooms. Adherence to safety rules while in the labs and
technology rooms must be practiced and observed by each user.
Since each room and computer lab are equipped with the available technology and electrical
and electronic equipment, personal safety and security aspects of the laboratory equipment
and the room needs to be preserved. Computer hardware, such as monitor, keyboard,
mouse, audio system unit, printer, overhead projector etc. should be treated with care.
Similarly, the hardware technology such as televisions, audio systems, video recorders are
have to be cared for and maintained.
When using computers and technology with high voltage electricity, safety precautions should
be taken during the use in order to avoid the risk of electric shock. Thus, the frequency of
maintenance of computer equipment should be done, especially the cables. Possibility of
short circuiting could cause fire, thus will damage computer equipment.
Data security in the computer should be taken care by backing up data in the hard disk, floppy
disks or other secondary storage devices. The aim is to secure a copy of the original file if the
original files are corrupted or damaged by viruses.
Several studies have shown that continuous use of computers can cause health related
disturbances such as headaches, muscle tension and bone (especially the shoulders, wrists,
neck, back, and below the waist), red eyes, running nose, and sight. Thus, the position of the
body, computer equipment and lighting in the lab space / room can affect the comfort and
security of computer users. Preferably a computer screen should be 15 to 30 degrees to eye
level and distance between eyes and the screen should be between 40-70 cm. Stretch out the
body frequently to reduce muscle tension. Move around the room to view lab / room to relax
the eyes.
To ensure long endurance of computer systems, equipment should be clean and dust-free
and placed in room that is not hot or too humid and stable table level. Table size should be
appropriate to put a computer. The distance between the computer and the wall should be
suitable for air circulation.
In terms of safety, users are encouraged to clean video display device or monitor screen
with a non-corrosive liquids. The best way is to wipe the screen with a wet cloth. Computer
monitors generally use the resolution of the picture (CRT), which can cause emission of high
light density not acceptable to the human eye retina. Therefore, the screen display should
have anti radiation screen, so that the eyes can be shielded from the damaging effects of light
from computer rays radiation.
The keyboard should also be taken care of by reversing the keyboard to remove dust. The
key gaps should also be cleaned.
Among other issues related to the safety of ICT are:
3

EDU3105

T4 MT12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL

TECHNOLOGY

Fraud
Damage / Program Modification / Computer Data
Information Theft
Copying illegally
Espionage
Cyber Gaming
Quick Rich Schemes
Pornography
Hackers
Virus Diffuser

Thus, learning educational technology in computer labs and technology rooms which are
equipped with electronic equipment should be protected by regulations for safety in order to
maintain life span of equipment and to enable effective teaching and learning to takes place.
12.3 Confidentiality
Confidentiality which is associated with technology is the care and preservation of the
confidentiality of technology information of "material", device or object, written materials
(such as topographic maps, plans, models, graphs, drawings), and the material / device that
contains voice (such as tape recorders), film, negative or devices that contain images that can
be produced, augmented or reproduced. It is understood that the low level of secrecy would
create a conflict of privacy values and confidentiality. Cryptographic techniques are often
used to safeguard, store and preserve digital information secret.
The values of confidentiality should be preserved, especially in the use of communication
tools such as a personal computer where the information in terms of financial status,
insurance, health and shelter are kept secret from certain parties who may be able to use
it for personal gain. These secrecy values are threatened due to the rapid development of
communication tools in terms of data, images or graphics transmission by e-mail. Thus, each
user of information and communication technologies should be more careful and responsible
in collecting, analyzing and reviewing the information and material received because careless
users will result in a secret spread to irresponsible party. This will undermine the security and
reputation of individuals, communities and countries.
In the management and administration of an organisation or country, information technology
is used to build and maintain the confidentiality of the development to the public or
government. The technology built with secrecy features are exercised through law
enforcement practices, regulations, licensing and administration enforcement practice.
In conclusion, in order to protect safety and national organizations, individuals or groups
who are responsible for collecting, reviewing, analyzing and evaluating the data / information
should consist of those truly responsible, trustworthy and honest. If not, negligence can have
catastrophic consequences to the organization or country. In this regard, education as the
pillar of the country must emphasize confidentiality and preservation technology proficiency
so that students can build strong mental strength, thus not be easily influenced by negative
elements.

T4 MT12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL

EDU3105

TECHNOLOGY

Think
There are some services available on the Internet, such as email, chat, newsgroups, bulletin
boards, and so on. As a teacher who adhere to the procedures and ethical use of the Internet
Explain,how do you protect your privacy so that all of your information cannot be easily
compromised?
12.4 Self-Regulation
Self-control is a self-effort or requirement on the behavior, actions and thought processes.
Self-regulation refers to a person's ability to emphasize the sense of self power against all
obstacles that block its action. Actually from childhood, children are trained to self regulate.
However, experience and exposure to various media can influence and reduce the capacity of
students to self-regulate effectively.
In the age of information and communication technology development, each individual should
have the self-control on their own actions. We have a responsibility to manage and use
technology well to achieve balance and integrity as a member of the family, the community
and the citizens of Malaysia. All access to information and printed materials, as well as
the media is a privilege and not the rights. Therefore, every individual should follow the
procedures and ethical use of materials and technology.
Each user of technology and information should have self-responsibility and self control.
While surfing the web, someone should be able to control yourself from surfing the material
that may violate the law or code of ethics and self-discipline. Priorities of balance, integrity
and quality of life as citizens, community members, students and employees should be
maintained.
Technology now gives individuals a variety of exciting challenges, opportunities and desire.
Electronic data is now readily available on computer, whether in the form of digital video,
music, text and other images. Consumers should be careful and self-discipline when
downloading material in order not to break the rules or by-laws outlined.
12.5 Current and Future Trends of Educational Technology
Electronic learning
This type of learning is also known as e-learning. This development is an alternative facility
to communication of information electronically to all students outside the formal classroom.
With this development, an educator can contact and educate small group of children, but the
number to be trained are many.
Internet and computers is the main resources to implement e-learning because the computer
is connecting to the internet tool that contains a wealth of information useful to students and
teachers, particularly with the acquisition of information on research activities, publications
and learning on the increase.
Through e-learning, information sharing can be more effective and promotes information
5

EDU3105

T4 MT12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL

TECHNOLOGY
and communication technology in education. Pupils not necessarily acquire material from
textbooks, but can access the website. In addition, a CD-ROM with elements of animation,
games, text and graphics that allows learning to be fun and interesting.
With the implementation of e-learning, it can help teachers who are unable to deliver lessons
for some reason. Pupils can be taught from the e-learning modules via the Internet or CD,
as well as helping to develop the potential of students in browsing information for learning
solutions and to fulfill their curiosity.
Traditional media is still relevant
Smaldino et al. (2005) have stated that many teachers would like to forget the traditional
media and focus on new technology. However, this reasoning is incorrect. The educators
should continue to use traditional media as the media type is more beneficial than new
technologies. The important thing is that teachers should be wise in choosing the variety of
existing media to stimulate learning.

For example, many classrooms still use chalk board or white board. Similarly, the overhead is
still used as effective teaching aids to attract and retain student attention despite the addition
of digital technology and computers. Textbooks and printed materials is the most popular
teaching tool.
Changing Role of Teachers
The teacher's role in learning is changing with the increase in the use of technology in the
classroom. Although the teachers cannot be taken over by technology, but the role of the
teacher has changed from a provider of information to a coordinator of learning resources. In
addition, teachers will be facilitators, managers, and the driving force which assisted students
with ways to find and process information from various sources.
Teacher no longer looking at class as a collective group, but rather look to at different group
of individuals capabilities, abilities and needs. Consequently, teachers are able to identify
individuals who need special counseling.
Today, teachers guide students along the lesson and not as a presenter on stage. With
this, the demand for teachers with computer skills has increased. As such, it is important for
teachers to be skilled in the use of electronic devices in order to facilitate students and to
maintain interest in students with various types of teaching media.

SUMMARY
This chapter describes the issues related to copyrights, security, confidentiality, and selfcontrol in the use of educational technology in teaching and learning. In addition, this paper
also discusses the current trends in educational technology closely related to learning.

EDU3105

T4 MT12- ISSUES AND CURRENT TRENDS IN EDUCATIONAL

TECHNOLOGY

REFERENCES
Dick, N., Carey, L. & Carey, J. O. (2005). The systematic design of instruction. Edition of 6.
New York: Pearson, Allyn and Bacon.
Johnson, D.L., Cleborne, D.M. & Liu. (1997) Using Technology in the Classroom, New York:
Haworth Press.
Ministry of Education, Copyright, accessed on June 27, 2008. from [http://www.moe.gov.my/
bbt/pengurusanhak cipta.php] Legal Research Board 2001. Copyright Act 1987 (Act 332) &
regulations & orders, Kuala Lumpur: International Law Book Services.
Norasiah Abdullah, Nor Risah Jamilah FAQ & Rosnah Mat Zain Ahmad (2009). Technology in
teaching and learning. Selangor: Multimedia.
Noriati A. Rashid, Boon, P. Y., Fakhriah Sharifah Syed Ahmad, & Wan Kamaruddin Wan
Hasan (2012). Technology in teaching and learning. Shah Alam: Oxford
Smaldino, S. E., Russell, J. D., Heinich, R., & Molenda, M. (2005). Instructional
technology and media for learning. Edition of 8. New Jersey: Pearson Prentice Hall
Smaldino, S. E., Lowther, D. L. & Russell, J. D. (2012). Instructional technology and media for
learning. Edition of 10. Boston: Pearson.
Willard, N.E. (2002). Computer ethics, etiquette & wafety for the 21st CenturyStudent,
International Society for Technology in Rducation, Eugene,

Anda mungkin juga menyukai