EXPLORE
Ethics in Practice
This activity aims for the students to determine wrong acts or doings with the use of school technology.
Below are different situations in the use of school technologies. Place yourself in each of the situation and internalize on the action you will do to solve the issues.
1. You as a teacher have purchased an educational software for use in your class. You’re colleague who is teaching the same subject borrows the purchased software and later installs the software in her own computer without your knowledge. You are aware that it is against the law. What will you do in this situation?
- I will tell his/her that it is against the law and he/she should ask permission first. I will also tell him/her that I can teach him/her own software that he/she can use for not to borrow to other.
2. You instruct your students that whenever in the computer laboratory, internet access will be allowed for educational purposes only. However, three of your students accessed the internet for downloading of internet games and play while you discuss the lesson. What will you do with these three students? What will you suggest to the school heads to limit the access of downloading internet games?
- I will talk to them privately after the class telling them that there is a rules and regulations that was discussed at the first meeting of the class and there is a consequences on what they've done. I will suggest to the school head to tell the technician to create a program that blocks the downloading of games in order to avoid students in downloading and playing games during class.
3. You (as a student) are aware that one of your classmates is being cyberbullied by some of your classmates. The victim is losing her self-confidence and self-esteem due to the cyberbullying experiences. What will you do to help the victim and to stop cyberbullying?
The following are the things that you can do to help others from being cyberbullied:
-Helping them to understand what cyberbullying looks like.
-Setting guidelines and best practices.
-Being alert.
-Being their support system.
-Figuring out the response together.
These tips can help teenagers from being cyberbullied:
-Encourage teenagers to appropriately limit what they post online.
-Victims of cyberbullying should change their online accounts in order to prevent further harassment.
-Parents and other adults responsible for the safety of teenagers should get involved by appropriate monitoring of online activities. Teaching appropriate online behaviors to teens is also important.
-Being alert.
-Being their support system.
-Figuring out the response together.
These tips can help teenagers from being cyberbullied:
-Encourage teenagers to appropriately limit what they post online.
-Victims of cyberbullying should change their online accounts in order to prevent further harassment.
-Parents and other adults responsible for the safety of teenagers should get involved by appropriate monitoring of online activities. Teaching appropriate online behaviors to teens is also important.
4. While the class is busy doing their activity in the computer laboratory, you were requested by your teacher to ask the computer laboratory technician, you saw that he was watching a malicious movie. The technician immediately stopped the movie and told you to just stay quiet. You are aware that it is against the policy of the school. What will you do with this situation? Will you really just keep quiet like what the technician has told you?
- For me, even though the technician told me to stay quiet but it is against the policy of the school so I should tell what I've saw to my teacher and also to the school head. If i stay quiet this might happen again.
Name: Maria Mikaela V. Salcedo Date: September 10, 2018
Assessing Effective Implementation of School Policies on the Use of Educational Technology
This activity aims to determine the appropriateness and effectiveness of policies on the use of educational technology being employed in schools.
Get a copy of your school’s policies on the use of educational technology/ computers in the laboratory. Assess the appropriateness and effectiveness of each policy by answering the questions below. Support your answer with a brief explanation.
1. Are the policies appropriate for the use of school technology?
Yes, it also concerns the safety of the students.
2. Are the policies effective?
Yes, because it was strictly implemented by the lab technician.
Yes, because it was strictly implemented by the lab technician.
3. Are the policies stated quickly?
Yes, it is also posted on the wall of the lab near the entrance and discussed during orientation.
4. Do the policies say what academic officials, teachers, staff, and students should and should not do with the school’s technology?Yes, it is also posted on the wall of the lab near the entrance and discussed during orientation.
Yes, it is said in the policies the do’s and don’ts of every employees and students just like copying and downloading software without consent. And also games are not authorized.
5. Are the penalties for violating the policies stated?
Yes.
Yes.
6. Are the policies fair enough with all the users of school technology?
Yes, even the employees has the same policies to the students to create fairness.
Yes, even the employees has the same policies to the students to create fairness.
7. Are there policies that you would like to remove or revise? Why? What will you change them with?
None, the policies stated is good enough for the students and the teachers.
None, the policies stated is good enough for the students and the teachers.
ASSESS
Name: Maria Mikaela V. Salcedo Date: September 10, 2018
This activity aims to develop students’ awareness with the do’s and don’ts in using school technologies.
This activity will be done by group (with 3 members in each group). Imagine one of you is an academic official, a teacher, and a student. Being representatives of the different sectors of educational institution, propose school policies on the effective use of technology in teaching and learning. Write your proposal below.
Computer Laboratory Rules and Regulations
1. Lab users must sign in and out of the lab.
2. NO FOOD, DRINK, OR USE OF TOBACCO IN ANY FORM is allowed in the labs.
3. Telephones are NOT for personal use.
4. TURN OFF CELL PHONES! If you need to use it, please take it to the hallway.
5. The only game allowed is Solitaire.
6. Children under the age of 16 must be accompanied and supervised by an adult. If supervision does not occur, or the situation becomes disruptive, the adult and child (ren) will be asked to leave.
7. Lab users should maintain professional and courteous communication. Electronic devices should be used on a professional level. No obnoxious or belligerent behavior will be tolerated.
8. Please operate the equipment with respect and care.
9. Activities in the lab(s) that are considered by the lab aides to be abusive to the software, hardware, and\or personnel may result in expulsion from the lab(s) and denial of future use of the lab(s).
10. Excessive use of paper and materials may require reimbursement to the lab. Paper being discarded should be placed in a recycle container.
11. The lab aides are here to help when they can and to maintain the labs' operation. However, the lab aides are not here to do your work for you. The lab aides will refer students to their instructors at the lab aide’s discretion.
12. Software may be installed by Computer Labs staff only. Do not install any software on your own. Files not put on by Computer Labs staff will be routinely removed.
13. Do not modify any software or files. Do not overwrite the operating system, modify the autoexec.bat or config.sys or any other system parameters.
14. For any hardware, software, printer, paper, or ink problems, please contact an aide.
15. College policy requires compliance with all U.S. copyright laws. Copying software without appropriate authorization violates these laws. Illegal use of materials in the labs is grounds for denial of use of the labs and confiscation of illegally used materials.
16. Any failure to follow these lab rules may result in the loss of your lab privileges.
CONSEQUENCES:
First Violation: The violator will receive a written warning from the Coordinator of Instructional Computing outlining the consequences that will follow if there are further violations.
Second Violation: The violator will be banned from all non-instructor supervised computer labs for the remainder of the term in which the violation occurs.
Third Violation: The violator will be permanently banned from all non-instructor supervised computer labs. The violator could appeal any of these actions through the normal grievance process outlined in the Student Rights and Responsibilities document.
|
No comments:
Post a Comment