10/14/2020
Lesson 2:
Safety Issues on the
Use of ICT including
e-Safety Rules
Lesson Outcomes:
1. Identified and explained safety issues on the use of ICT.
2. Listed and applied e‐safety rules in the use of ICT.
Some RISKS
in the use of
ICT and
E-NETWORKING
1
10/14/2020
Some Risks in the Use of ICT and e-Networking
1 Exposure to
inappropriate
content, including
online
pornography.
Some Risks in the Use of ICT and e-Networking
2 websites like
Lifestyle
self‐harms
and suicide
site, and hate
sites.
2
10/14/2020
Some Risks in the Use of ICT and e-Networking
3 Cyber‐bullying in
all forms,
receiving sexually
explicit images or
messages.
Some Risks in the Use of ICT and e-Networking
4 Privacy issues
including
disclosure of
personal
information.
3
10/14/2020
Some Risks in the Use of ICT and e-Networking
5 Health
and
well‐being
Some Risks in the Use of ICT and e-Networking
6 Prolonged
exposure to
online
technologies.
4
10/14/2020
Some Risks in the Use of ICT and e-Networking
7 Addiction to
gaming and
possibly
gambling.
Some Risks in the Use of ICT and e-Networking
8 Theft and
fraud from
activities such
as phishing.
5
10/14/2020
Some Risks in the Use of ICT and e-Networking
9 Viruses,
Trojans,
spyware and
other
malware.
Some Risks in the Use of ICT and e-Networking
Social pressure to
10 maintain online
networks via
texting and social
networking sites.
6
10/14/2020
Minor
MISUSE of
ICT
in School
Minor Misuse of ICT in School
1 Copying
information into
assignment and
failing to
acknowledge the
source.
7
10/14/2020
Minor Misuse of ICT in School
2 Downloading
materials not
relevant to their
studies.
Minor Misuse of ICT in School
3 Misconduct
associated with
subject logins,
such as using
someone else’s
password.
8
10/14/2020
Minor Misuse of ICT in School
4 Leaving a mobile
phone turned on
during class
period.
Minor Misuse of ICT in School
5 Unauthorized
taking of pictures
or images with
mobile phone
camera, still or
moving.
9
10/14/2020
E-SAFETY
Being safe in the internet.
The act of maximizing a user's
awareness of personal safety and
security risks to private
information and property
associated with using the internet,
and the self‐protection from
computer crime
The process of
administering
and managing
computer networks.
NETWORK
MANAGEMENT
10
10/14/2020
Network Management
Safety in the Use
1. of Network in
Schools
1.1. Make clear that no one
should log on as another
user.
Network Management
Safety in the Use
1. of Network in
Schools
1.2. Require all users to
always log off when they
have finished working.
11
10/14/2020
Network Management
Safety in the Use
1. of Network in
Schools
1.3. Maintain equipment to
ensure health and safety.
Network Management
Safety in the Use
1. of Network in
Schools
1.4. Provide students with
access to content and
resources through guided
e‐learning.
12
10/14/2020
Network Management
Safety in the Use
1. of Network in
Schools
1.5. Set up a clear disaster
recovery system in place
for critical data that
include secure, remote
back up of critical data.
Network Management
Safety in the Use
1. of Network in
Schools
1.6. Secure wireless
network to appropriate
standards suitable for
educational use.
13
10/14/2020
Network Management
Safety in the Use
1. of Network in
Schools
1.7. Install all computer
equipment professionally
and meet health and
safety standards.
Network Management
Safety in the Use
1. of Network in
Schools
1.8. Review the school ICT
system regularly with
regard to health and
safety and security.
14
10/14/2020
Network Management
Password
2. Policy
•Only authorized users
will have individual
passwords.
Network Management
Personal Mobile
3. Phones and
Mobile Devices
• All mobile phones shall be kept away in
a box away from the children or
learners and access is only allowed at a
breaktime or at the end of classes or
when needed during the class period.
15
10/14/2020
Setting
up an
Educational
Technology
Room
Provide tiltable tables.
Technology room
Provide anti‐glare screen filters.
Setting up an
Educational
Provide adjustable chairs.
Provide foot support.
Make sure lighting is suitable.
Make sure work stations have enough space.
Provide schedules.
16
10/14/2020
Safety Rules No trailing wires across or around the room.
Electrical sockets should not be overloaded.
Electrical equipment should be safety‐tested regularly.
There should be enough space for people to move.
Bags and obstacles should be stored our of the way.
Food and drinks should not be placed near machines.
There should be proper ventilation.
Fire extinguisher should be available.
Fire exits must be clearly marked and free from clutter.
10 Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not
paid (without permission).
7. Thou shalt not use other people's computer resources without
authorization or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration
and respect for other humans
17