.

Friday, February 22, 2019

Ethics in ICT Education: Utilizing Mobile Gadgets in Teaching and Learning Process Essay

In a applied science-driven and digital baseball club, getting discipline pronto is important to both instructors and students. The expansion and every daylight use of randomness and discourse technologies (ICTs) put one over make it possible to quickly and instantly find cultivation, fate ideas among peer groups, leave behind instructors to easily interact with their students, and offer them with enabling weapons platform for research and exploring r growingary ideas. According to FBI- lucre Crime Complaint Center, Nigeria ranked tertiary in the world after US and UK, in internet dish mavinst activities. Yet, on that point is no cyber security law to checkmates these pops locally.Thus, government should work intimately with the ICT partnership (NCC, NITDA, NigComSat, Galaxy backbone,Telecoms firms, and Consultants), in conjunction with legal familiarity, to enact seize cyber detestation laws. The write-up, bring to light the importance and application of sprig htly gadgets in cultivation process, issues associated with victimization expeditious devices and shipway to combat them. Keywords Digital nine, erudition, students, instructors, education, officious gadgets. incoming lively gadgets and addresss hind end be a double-edge sword the two drop be use as a source of many benefits, for instance, the slackening with which digital reading can be analyzed, transmitted, and sh ard among numerous people and groups. On the some other hand, they can be employ to create ship canal of breaking laws or taking benefits away from others. For example, sending unsolicited e-mails is one of the compelling ethical issues raised by contemporaneous nomadic gadgets users. Generally, discipline and conversation technology (ICT) and the used of mobile gadgets argon applied for the beneficial of humankind however it can also be abused and used as a tool for felony (L&N Long, 2005). Thus, the evolution of mobile gadgets urinate generated int ense controversy and raised serious issues nigh information and communication technology ethics. An ethical exclusive accepts and lives by a situated of clean-living principles and values.These principles define what is favorablely accepted as good and on the other hand what is bad, until today society continues to raise questions about what is or not ethical in the used of information technology gadgets. These issues argon so important to our society, to the extent that educators see it as core field of operations that shall be integrated into college curricula. Educators believe that, if members of the society are made alive(predicate) of the consequences of their natural actions, then there would be wholly a few(prenominal)er(marginal) people that will be motivated to commit computer crimes, contaminate frames with false information, post sexy material to the internet, or abuse sanctity of intellectual plaza (K & J Laudon, 2003). .Ethics, Education, and data and Co mmunication Technology (ICT) Ethics in information technology can be specify as the moral conducts and decisivenesss confronting individuals, groups or institutions in use(p) in information and communication technology (ICT) shapes (Martin M. 2009). It could also be specify as the study of moral ideals, character, policies and relationships of people and institutions involved in the activities of information and communication technology (Martin M. 2009). Whereas educational technology is the study and ethical practice of facilitating learning and improving performance by creating, utilize, and managing appropriate technological processes and resources (AECT, 2004). Conversely, information and communication technologies (ICTs) can be defined as a come of technological tools and resources used to communicate, create, disseminate, store and manage information.These technologies include internet, tablet computers, shiny phones, and broadcasting technologies such as radio and tele vision (Kukulska-Hulme et. al. 2005). The use of ICT (mobile gadgets and phones) for a range of different learning processes has been the prime concern of every right-thinking individual in this era. It is realized that, mobile gadgets and phones could add a completely sweet dimension to the teaching and learning process due to a large range of attributes, such as being portable, ubiquitous, pervasiveness and the functions such as voice, depiction and data services, camera, video, radio, and the internet connectivity (Kukulska-Hulme et. al. 2005). Besides, Bressler, D, et.al. (2007) states that youth should be the target and first anteriority user group of mobile based teaching and learning, be throw research showed that teenagers and college students have a higher interest in every mobile phone activity than any other age group. Research QuestionsThis schoolbook aim to address the following questions raised by mobile gadgets and users I. What ethical, social, and government al issue arises by the uses of mobile technology gadgets? II. What are the specific codes of conduct that whitethorn be used to guide decision about cybercrime? III. Why do contemporary mobile gadgets pose challenges to the protection of individual rights and intellectual property? IV. How do mobile gadgets affect day-by-day life of instructors and students? V. How could mobile gadgets allow continuous find to education and reach marginalized groups of a society? RQ1-What ethical, social, and political issues arises by the uses of mobile technology gadgets?Ethical, social, and political issues are closely connect together. The ethical dilemma we may face in our academic system typically is reflected in social and political stupefytings of the society (K & J Laudon, 2003). permits imagine our society, in which we are all living forrader the advent and penetration of mobile gadgets as a calm kitty, an ecosystem in partial equilibrium with individual, society, and political inst itutions. Under this condition, everyone knows how to act in this pond because social institutions (family, colleges, polytechnics, universities, and organizations) have authentic well-honed rules of behaviors and these are backed by laws developed in the political zone of the society that stipulate different do and promises appropriate penalty for violation any of the laid down constitution and guiding principles.Now, information technologies development tosses a rock into the pond. The forces and pulsation as a result of tossing rock (mobile gadgets evolution) into the ponds, which is a powerful shock of new information technology revolutions that hit our social systems which is more or slight (at rest or partial equilibrium) and thus generates positive and negative pulses. Suddenly, individuals, and society are confronted with new situations often not covered by the previous(a) laws (rules and code of conduct of the nation). The figure downstairs portrays moral dimensions th at connect ethical, social and political issues (K & J Laudon, 2003). Figure 1 Moral Dimensions (Ethical, Social, & Political) Issues Related To quick GadgetsExcerpt from Essential of Management Information establishments, ordinal Edition.Information / holding rights and obligations what information rights do individual or institutions posses with respect to the information about themselves? What can they protect? How will traditional intellectual property be protected in a digital society in which accountancy of ownership is rugged? Accountability and Control who will be held trustworthy and liable for the harm done to individual, institutions and collective information and property rights? System and Life Quality what services should we demand to protect individual rights and the prophylactic of the society? What services and practices are supported and accepted by the society?RQ2- What are the specific codes of conducts that can be used to guide decision about cybercrime? C ybercrime can be referred to as the use of mobile gadgets or computers and internet to commit illicit act. Cybercrime (computer assisted crime) includes e-mail scams, hacking, distribution of uncongenial software (viruses and worms), denial of service(DoS) attacks, theft of data, fraud and impersonation, online auction fraud, phishing, child pornography, espionage (theft of craftsmanship secrets), cyber contraband and so on (Uwaje Chris, 2009). With the proliferation of mobile gadgets that allow easy addition to internet and online resources, it becomes more disturbing because the cyber space, through which these crimes are perpetuated, is not defined by political or geographical boundaries, thus enacting or amending laws to tame them becomes a challenge.According to FBI- meshwork Crime Complaint Center (IC3 circulate, 2009), Nigeria ranked ternary in the world after US and UK, in internet unsound activities. Yet, there is no cyber security law to checkmate these issues locall y. Similarly, Ewelukwa (2012), lamented that various legislative bills before the National fiction, aimed at preventing cybercrime, have been neglected by the lawmakers including The data processor Security and Critical Information Infrastructure Protection Bill 2005 sponsored by the Executive failed to become law (Ewelukwa, 2012).Ewelukwa (2012) further stated Other cerebrate legislative bills that have not yet been passed by the National Assembly include the Cyber Security and entropy Protection theatrical (Establishment, etc) Bill 2008, electronic Fraud Prohibition Bill 2008, Nigeria Computer Security and Protection Agency Bill 2009, and the Computer Misuse Bill 2009. Cyber security entails all measures interpreted proactively to prevent and ensure safety from cyber attacks and related crimes. Cyber attacks vary and evolve on daily basis with advances in ICT gadgets.Therefore, government should work closely with the ICT federation (NCC, NITDA, NigComSat, Galaxy Backbone, Te lecoms firms, Experts and Consultants), legal community, to enact appropriate cybercrime laws, and expedite action to residence the aforementioned bills into laws. Thus, would boost the nations image before the online community and globally.RQ3- Why do contemporary mobile gadgets pose challenges to the protection of individual right and intellectual property? Ethical issues have long preceded the evolution of information technology, they are the abiding concerns of every society everywhere on earth, nevertheless, information technology has raised and heightened ethical concerns, put stress on existing social arrangement, and made existing law obsolete or severely crippled. There are three key technological trends that are responsible for these ethical traumas (K & J Laudon, 2003) I. Increases in Computing Power ordinary people are getting possession of different mobile gadgets for their day to day undertakings (research works, businesses, leisure and entertainment), due to inventi on of high powered gadgets with varieties of features made available by the manufacturers.II. Advancement in Data Analysis & Declining Data Storage Costs it is clear that with contemporary information systems technology and data analysis techniques, one can assemble and combine myriad pieces of information about an individual much more easily than in the past. For instances, information about an individual such as credit card purchases, call in calls, magazine subscriptions, video rentals, mail order purchases, banking records, local, state, and federal governments(including court and constabulary records), can all be gathered and mined properly. III. Networking and advances in Internet sharing and cominging large quantities of data over the internet, open the possibility of excavation large pools of data remotely utilise mobile gadgets, and thus permitting the onslaught of privacy of others.RQ4- How do mobile gadgets affect everyday life of instructors and students? ICT and m obile gadgets in schools, colleges and universities have affected everyday life of both instructors and students, both in positive or negative directions as pointed out below Students can record homework and assignments on their phone calendar. Help instructors to monitoring device their lecture schedules.Use of camera functions in geography and physical sciences subjects to records things and report back to class. Some teachers learned to teach in different ways with an emphasis on independent study, and thus incorporated mobile gadgets in their lessons. Disruption during lectures in cyber- bullying one another using text and blackberry messaging(BBM) Spiteful comments or spreading malicious gossips.Some students used mobile gadgets (for fashion) to chase opposite sexesRQ5- How could mobile gadgets allow continuous find to education and reach marginalized groups of a society? It would be very difficult or impossible for the conventional (class-room) delivery method of education to provide continuous and educational opportunities for majority members of a society. ICTs and mobile gadgets have the answers and say-so to help reach this objective. They are portable, pervasive, personal, affordable, ubiquitous, and interactive and hence, instruction can be delivered anywhere and at anytime through it. Moreover, it is an aid to formal and informal learning, it improver and enrich formal schooling, make learning more accessible, personalized and flexible for students everywhere. And thus holds enormous potential to transform the delivery of teaching and learning process.Mobile devices can quash geographic, social, and infrastructure barriers to reach populations, and marginalized groups by providing them with access to further learning and development. These devices facilitate distance learning in situations where access to education is difficult or interrupted because of geographical barriers. And therefore, m-learning or mobile learning, offers modern ways to support learning process through mobile devices, such as handheld tablet computers, MP3/MP4 players, smart phones and mobile phones. And thus, a mobile gadget is not only a device, but a door to greater education and continuous interactive learning process.Advantages of using Mobile GadgetsStudents, teachers, and researchers have many reasons to consider using mobile gadgets, since these devices are one of the most versatile electronics gadgets in the market today. Besides the evident communication advantages, mobile phones have features, such as cameras and internet accessibility, that can help students and researchers in all aspects of their learning processes, from their studies to their social and professional lives and practices. hombre Stafford (2013) stated in his write-up some advantages of mobile phone to college students, among which are touch communication, parental connection, studying and research, capture memories, social and professional networking and organizat ion. Issues and Crimes Associated with Mobile GadgetsAs cell phones have rapidly become ubiquitous in everyday life, the issue of cell phones in school has become a hotly debated topic. Many disadvantages also exist concerning student cell phone use, Rebecca Richards (2012), mentioned few such as causes distractions, exams cheating, e-mail scams, pornography and cyber contraband.RecommendationProvision of extra internet services (both wired & wireless) in our various institutions of learning using technology such as WIFI, or WIMAX, to facilitate learning processes using ICT gadgets. Universities, polytechnics, COEs, and other institution of learning should use proper network administrative tools to police students over inappropriate use of services provided to them it can evenly ban and restrict access to ALL social networks that can cause distractions to their studies.Use of software tools like web anonymizers (such as Psiphon, Surfola, Silent Surf, and Merletn) to entomb user t racks from their predators. Every institution should review its code of conducts to include contemporary netiquettes, so that students and researchers are made aware of the cause of actions of every crime they committed. Likewise, at national level government should work closely with the ICT community (NCC, NITDA, NigComSat, Galaxy Backbone, Telecoms and IT firms, Experts and Consultants) and Legal community to enact appropriate cybercrime laws, and expedite action to sign all the legislative bills before them into laws.Conclusion spot there are enormous benefits to be gained out of mobile gadgets in damage of m-learning, enrichment, portability and flexibility in using ICTs throughout formal educational systems, there is even greater value to be gained in using the mobile technologies to increase access to millions of instructional resources who are currently outside the educational footprints.A combination of mobile technologies and relevant applications softwares, have the potent ial to overcome the barriers of time, distance, and allow adult education for those who have not been properly educated and now wish to be informed, well educated, trained or enlightened. It is likely that ICTs offer opportunities not available previously to educators, using tools such as e-mail Webinar, audio-video, computerconferencing, both synchronously and asynchronously. With aid of ICT and appropriate set of application tools, a very rich interactive and learning surround can be created that allows learners to dictate their pace of learning, or place of learning.While the ICT tools empower our communities, they need not take away the role of the instructors or research supervisors instead, students, firms, researchers and instructors should come together for a common purpose, work collaboratively with understandably defined roles on a shared platform to attain the set objectives of any kind. These communities encompass all levels and sectors of human endeavor, from basic ed ucation to graduate student studies, from teacher training to business studies, and from non formal studies to language instruction, companies and research institutes. However, only infrastructure, fiscal resources, and policy support, would inhibit exploitation of this potential. And thus, an ICT world is an exciting major planet of continuous learning process.ReferencesAECT (2004). Association for Educational Communications and Technology Retrieved from http//ocw.metu.edu.tr/file.php/118/molenda_definition.pdf visited on 05-04-2013. Bressler, D, et.al.(2007). Information and Communication Technology in Education, Retrieved frm. http//www.schoolnet.lk/research/mobile_phones_for_teaching_learning_science/ visited on 07-05-2013. Ewelukwa (2012). treasured A law on cyber security Retrieved from http//www.thenationonlineng.net/2011/index.php/business/35334-wanted-a-law-on-cyber-security.html , visited on 07-05-2013. IC3,(2009). Internet Crime Complain Center 2009Retrieved from www.ic 3.gov/media/annualreport/2009_ic3report.pdf , visited on 19-04-2013. Kukulska Hulme et.al .(2005). Innovation in Mobile Learning a European Perspective Retrieved from http//www.schoolnet.lk/research/mobile_phones_for_teaching_learning_science/ , visited on 19-04-2013 khat Stafford, 2013).Use of Cell Phones and College Students http//www.ehow.com/list_5961606_advantages-cell-phones-college-students.html, visited on 07-05-2013. Laudon K.J, (2003). Essential of Management Information Systems, Fifth Edition, Chapter 5 Ethical and Social Issues in the Digital Firm, P. 142-143 Long L.N, (2005).Computers Information Technology in Perspective, 12th edition, Chapter IT ethics, Crime, and Privacy. P. 278 Martin M. (2009).Ethics in Engineering, 3rd edition unexampled Delhi MC Graw-Hill P.2-3 Rebecca, Richards (2012). Use of Cell Phones and College Students Retrieved from http//www.ehow.com/list_5961606_advantages-cell-phones-college-students.html, visited on 07-05-2013. Uwaje, Chris (2009). Cyber Crime Its Implications for Internet military control Growth In Nigeria Retrieved from http//techtrendsng.com/cybercrime-its-implications-for-internet-business-growth-in-nigeria/, visited on 15-05-2013.

No comments:

Post a Comment