Digital Etiquette Certification

minedesertSoftware and s/w Development

Oct 31, 2013 (4 years and 9 days ago)

90 views

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

World’s 1
st

Digital
Etiquette Certification

1
st

Training of Trainer, UPM

19 March 2011

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Table of Content

SECTION 1:

Introduction to IC CITIZEN


SECTION
2

1CITIZEN : A Malaysia Story


SECTION
3

Other Project Ideas




Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

SECTION 1

Introduction to IC CITIZEN

“The people who are crazy enough to think they can
change the world are the ones who do.”







Steve Jobs, CEO of Apple

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Current
Landscape

3D Map of Worl d
-
Wi de Web

Domai n Names

Current Landscape


Proliferation of access to Digital Media


Google, Yahoo, IE, Bing, Safari,


Web 2.0, Forums, Blogs, Social Networks





Everything E: e
-
Commerce, e
-
Safety, e
-
Privacy,

e
-
Shopping


Phishing, Cyber
-
Bullying, Identity Theft, Spyware,
Plagiarism, Pornography


Cultural Values


Individualist
vs

Collectivist,
Western
vs

Eastern, Conservative
.


Freedom, Rights & Responsibilities, Ethics,
Respect






Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Our Customers 8 Norms
*


They
prized
FREEDOM

& Freedom of CHOICE


They want to
CUSTOMISE

things, MAKE them
their OWN


The are natural
COLLABORATORS
, enjoys a
CONVERSATION
,
NOT

a
LECTURE


They
SCRUTINIZE

YOU and your ORGANISATION


The insist on
INTEGRITY


They want to have
FUN

even at SCHOOL and at
WORK


SPEED

is normal


INNOVATION

is part of
LIFE


* “GROWN UP DIGITAL”;
Don
Tapscott

(2009)

The digital technology explosion is not only changing the way we live and
communicate but is rapidly
altering our brain
.

Gary Small, M.D, Author of
iBrain


Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

The buzzword

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

World Headline News

7

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM



What & Who

What is the Programme


A
Global Certification Program
to prepare users
for a society full of technology without misusing
and abusing them.



It lays down rules of acceptable
‘netiquette’
or
good

behaviour

that must be applied when
operating digital devices and accessing the
internet within an organization and society.


Who
is Our Target Audience


(Digital Native
-
Digital Immigrants)

NetGeners
, Parents, Children,
Teachers
,
Employees, Civil Servant,

anyone
who is a
Netizen

Any users who utilize digital devices and the
internet from their homes, workplace or
schools

Emerging Economy, conservative culture,
collectivist culture of Asia, Middle
-
East,

Advance Economies ,
Individualistic
culture

What are the Objectives

Objectives of IC CITIZEN Certification:


To produce
digitally literate
and
responsible
citizens via
:


Becoming
critical thinkers
in analyzing sources
of information and messages as well as to
evaluate what the impact can be


Understanding
ethical consequences of online
behaviour


Making
good ethical decision of their
behaviours online



To globally promote ‘good behavior’ when
communicating and foster ‘unity’ and
‘collaborative culture’ in the digital world

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Why

Why

A Sustainable & Scalable
Model is via
Education


“Education is the teaching of the overall citizenship, to
learn to live together with fellow citizen, and above all

to learn to obey the law”.


Thurgood

Marshall(1974); US Supreme Court Justice


Help youth make
good ethical decision
about their behaviours when they are
online


Help parents and teachers to understand the
current trend in digital world.


Bring them up to the speed so that they can
be
good mentors
to their young

Youth

Parents &
Teachers

Benefits

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Modules


The measures and best
practices for
Netizen

to guard
their personal safety and the
security of their networks. It
teaches them 2P


Predators

& Pornography.


4. e
-
Safety



The privileges and responsibilities
of all users, ethical behavior and
expectations that come with it. It
also include credibility &

integrity

of online content and
critical thinking about what is
true/false.



8. e
-
Accountability

5.
e
-
Interaction &


Collaboration



The learning highlights the
exchange and sharing of
information using digital
systems or tools. Include
humility, loyalty

and respect for
other when communicating.





Understanding the privilege to
use electronic information in
society as well as the rights to
an equitable, secure and
reliable access.

1. e
-
Access

2. e
-
Literate


The level of capabilities to use
technology and knowing when,
when not and how to use it
appropriately. It highlights how
online behavior will have major
consequences offline.


6. e
-
Enterprise


The business conducted online

using any of the Internet
-
based
Applications . The concept of
‘common sense’ is also key.



Governing communication and
technology use. This includes
respect for ownership &
authorship.


3. e
-
Rule


Physical and psychological well
-
being in a digital technology
world



7. e
-
Care

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Learning Objectives:


Explain
what e
-
Access is


Instil appreciation of some Government
-
based digital initiatives


Share information on how and where to
access the Internet


Share information on how people with
disabilities use technology


Instil positive attitudes towards the use of
technology


Module Description: e
-
Access

Learning Outcomes
-

You will be able to:


Understand
what e
-
Access is


Appreciate
how some governments
have helped to boost e
-
Access


Know
how and where to access the
Internet


Know
how people with disabilities
access the Internet


Have
a positive attitude towards the
use of technology

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Learning Objectives:


Provide
you the information
about
appropriate or inappropriate ways to
disclose information through the Internet.


Help you to
have a better understanding of
how to distinguish between reliable and
unreliable resources from the Internet.


Get you to
know how to specify the
positive and negative implications of
having a digital footprint.


Provide you guidance
on how to distinguish
between trustworthiness and
untrustworthiness of digital resources.


Provide you better
understanding of
actions/ activities that can be classified as
cyber bullying and its consequences
towards the community.

Module Description: e
-
Literate

Learning
Outcomes
-

You
will be able to:


Identify
and utilize digital technology in
learning and working environments


Apply
appropriate etiquette and
management of digital communication
and social networking tools


Apply
appropriate knowledge and skills
to evaluate trustworthiness


Apply
appropriate knowledge and skills
to evaluate security of digital resources


Understand
the importance of digital
technology and its evolution

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Learning Objectives:


Identify
the specific variations of digital
crimes


Identify
the effects of cyber crimes on a
particular sector (e.g., the effect of digital
piracy on the economy)


Identify
an act of Intellectual Property
infringement


Describe
the importance of having legal
rights and restrictions governing
technology use

Module Description: e
-
Rule

Learning
Outcomes
-

You
will be able to:


List at least three
(3) examples of cyber
crimes


State at least three
(3) effects of cyber
crimes related to individuals or the
economy


Describe at least three
(3) scenarios
pertaining to Intellectual Property
infringement


Explain at least three
(3) reasons why it
is important to have legal rights and
restrictions governing technology use


Elaborate at least three
(3) benefits of
having rules or regulations governing
communications and technology use

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Learning Objectives:


Forms
of digital security breach


Specify
the conditions under which
digital security breaches and attacks
can happen


Identify
the effects of various kinds of
security breaches and attacks


Types
of Online Protection


Identify
various ways to get protection
from security breaches and attacks


Explain
why it is important to guard
your digital safety or security


Compare
and contrast the differences
between using shared resources and
dedicated resources

Module Description: e
-
Safety

Learning
Outcomes
-

You
will be able to:


Describe
different forms of digital
security breaches and take necessary
precautions against those breaches


Make
efforts to update virus protection
software, and protect personal
information.


Identify
the limits placed on the
resources to be shared on global
networked systems


Evaluate
unethical digital acts and
security issues that affect the security
of electronic data

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Learning Objectives:


Introduce
concepts related to the various
forms of today’s digital communication and
collaboration;


Distinguish
the intention (for good or bad
cause ) of utilizing various digital
communication and collaboration tools;


Demonstrate
ethical practices when
exchanging and sharing information over
networked systems;


Articulate
the importance of consequences
of online
behaviour.

Module Description: e
-
Interaction &
Collaboration

Learning
Outcomes
-

You
will be able to:


Identify
various forms of today’s digital
communication and collaboration tools;


Know
when to apply or use digital
communication and collaboration tools
appropriately and ethically;


Identify
which
behaviours
are ethical or
unethical when exchanging and sharing
information over networked systems;


Explain
the consequences of online
behaviour
and its impact for the
purpose of making better online
decisions.

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Learning Objectives:


Identify
methods for determining whether
a site is valid


Identify
ways to protect yourself from
credit card fraud


Identify
ways to protect yourself from ID
theft


Identify
potential consequences of impulse
buying

Module Description: e
-
Enterprise

Learning
Outcomes
-

You
will be able to:


Understand
the ground rules of online
transaction and be able to conduct
online transactions safely


Identify
the consequences of impulsive
buying

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Learning Objectives:


Identify the proper ergonomics for
computer related work


Identify
health hazards related to computer
usage


Identify
social problems associated with
Internet and computing addictions


Identify
ways to recycle and properly
dispose of computer equipment

Module Description: e
-
Care

Learning
Outcomes
-

You
will be able to:


Describe
three (3) ergonomic
conditions that contribute to
performance and productivity
enhancements


Explain
three (3) precautions to
consider in preventing the occurrence
of physical discomforts and concerns
when using computers


Elaborate
on three (3) signs and
symptoms of impulsive Internet and
computing addictions


Express
three (3) importance to
relinquish and recycle their surplus
computers in a secure and ecologically
-
friendly manner

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Learning Objectives:


Articulate the importance of ‘being
accountable’ when using digital technology


Compare
and contrast two different AUPs
and determine which are most fair.


Identify
forms of copyright infringement
and its effects on various aspects of life


Distinguish
between ethical and non
-
ethical
behaviours
with respect to ethical
use of digital technology

Module Description: e
-
Accountability

Learning
Outcomes
-

You
will be able to:


Define
accountability in the context of
digital technology usage


Describe
the importance of
accountability in
the digital world


Differentiate
between an a accountable
action and non
-
accountable action


Provide
sound judgment on any action
deemed accountable


Define
AUP and critique the fairness of
sample AUP


Explain
the consequences of copyright
infringements


Critically
discuss and make sound
ethical decisions on the inappropriate
use of digital technology via case study

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

IC CITIZEN Exam

At the end of training session, you will
take an IC CITIZEN exam certification:


45 items; with options


objectives


drag & drop


mix & match


60 minutes


Passing score: 640



Sample of Exam Transcript

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

IC CITIZEN Training Materials


Currently available in English


Will also be available
in these
languages:
Bahasa
, Mandarin
,
Arabic and Thai


Materials
available:


Learning
Module


1CITIZEN Trainer Handbook


1CITIZEN Student Quick
Reference


Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

SECTION 2:

1CITIZEN: A Malaysia Story

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

About 1CITIZEN Programme

IC CITIZEN has been packaged under a
National Training Program
called:





Overview


A special training program developed by Prestariang ,
aimed
to
foster national unity via appropriate use of
technology


Focus on digital etiquette to promote national
integration & unity; aligned with 1Malaysia



Programme
Objectives


To develop a sense of '
keNegaraan
', collaboration,
responsibility and ownership to the communities during
their online digital experience



To 'infuse' positive messages among Youth



To encourage youth volunteerism and activism


To
integrate a Malaysia
-
owned Globally Benchmarked
and Standards for digital literacy by taking IC CITIZEN
Certification

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Outcomes


Trained & Certified
Malaysians



National Grid of Unity


Digital Portfolio
of works or projects
created “By
-
Users
-
For Users” at the
end of the 2
-
day
training


The

Best
-
of
-
the
-
Best
” of these
projects will be uploaded to a Data
Bank and managed as a “
National
Grid of
Unity



Awards
& Incentives will be given


Best Digital Poster on 1Malaysia


Best Blogs on Unity


Best short
-
video on
Patriotism


Scalable
&

Sustainable
Bottom
-
up
content development strategy for
1Malaysia



Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Creating Digital Portfolios

At the end of training session, you will
also produce a Portfolio


as proof of
learning


What is DIGITAL PORTFOLIO?


A digital portfolio is a project that you
need to produce in order to
demonstrate
your
understanding
what it means to be a responsible
Netizen

through different tools and media.


Using
one or more IC CITIZEN elements
as your portfolio content will
confirm and verify your understanding of the ground rules that are to be
used acceptably in the digital world today.


9 CATEGORIES
for selections


Can be submitted as in
INDIVIDUAL
or
GROUP




Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Sample Projects

Open Category

Photo

Patriotism
& Unity through PLKN


UNESCO Thematic Poster
Competition
in line with
International Celebration Day

eg: Worl d Book Copyright Day, 23
Apri l



Posters Competition



Video Clips



Facebook Page


Creative Writing

Haiku Calendar

Competition 2012

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Creative Writing: Poem/Haiku

Title:


Be Careful What You Tweet!







Theme:


Technology







Description:


The visual of the 3 birds representing the 3 main
races in Malaysia complements the poem below
urging people to be careful what they tweet.







Element Used:

e
-
Interaction & Collaboration







Software Used:

Illustrator


Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Photo: Photo
-
Essay

Title:


Internet Access Abuse







Theme:


Technology







Description:


This photo essay shows an employee abusing
internet access and using it for unethical
purposes by making fun of his boss,
downloading and watching movies during office
hours. His boss soon finds him out.







Element Used:

e
-
Access , e
-
Literate







Software Used:

Photoshop


Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Open Category: Board Game

Title:



The Social Media Game







Theme:



Entertainment







Description:


Players are taught how to use social media to interact
and collaborate in the right way through this board
game. The goal of the board game is to foster 1
Malaysia through the right usage of these media as
indicated by the Malaysia flag at the finishing line. The
rules of the game are simple, just throw the dice and
move accordingly. Maximum 6 players at a time.







Element Used:

e
-
Interaction & Collaboration







Software Used:

Photoshop

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Facebook Page

Title:


Respect for Copyright







Theme:


Technology







Description:


In this Facebook page, topics related to
copyright issues as well as fair use are discussed.
For example, whether or not the usage of illegal
software is deemed as fair use for students who
don’t have the money to purchase the original
ones.







Element Used:


e
-
Accountability


e
-
Rule

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Poster

Title:


Right
-
Click & Save







Theme:


Malaysia Food







Description:


A screen capture of someone trying to save an
image is turned into a type of inspirational
poster stating that right
-
click and saving is the
equivalent of theft.







Element Used:

e
-
Rule , e
-
Accountability







Software Used:

Photoshop




Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Video Clip

Title:


Porn Degrades Women







Theme:


Entertainment







Description:


This is a puppet show about how pornography
can degrade women. Computer users are
discouraged from watching pornography in this
short clip.







Element Used:

e
-
Safety







Software Used:

After Effects




Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

SECTION 3:

Other Project Ideas

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

1.
YOUTH PROGRAM (
NETGeners
)


1Malaysia for Youth Program



CONCERNS


Irresponsible
cyber activism
; illegal downloads,


socially unacceptable etiquette, Opposition blogs


STATISTICS


90%
of university students are
connected

online;
37% o
wns notebook; Main online activities are
communicating

with
friends and families,
games

and
entertainment
; 65% gets their
news on politics
from the Internet;
79%

of urban
Netgeners

(19
-
25) are connected online;
78%

teens says Internet helps them to do their
assignments
; 66% of teens use
their mobile phone to send or receive text messages; 1 in 5 teens have received
sexting
;
26% of 18
-
23 years old
says they
texted while driving; 45% of mobile phone teen owners have sent
sexually suggestive, nude images

of themselves to
someone else .



PROJECT
BRIEF


The ruling party was heavily punished in the last 2009

General Election loosing its 2/3 majority for the first time

since 1957. The opposition uses the
Internet

heavily as a campaign tool and managed to influence
75% of youth
from the
the 19
-
26 voting age group to vote from them. As part of 1Malaysia initiative by the government, ‘
Net influencers’

such as
university students at all public University will be required to pass the
Netizenship

module before they graduate. Students
will also be required to pass an international accredited
ICT certification
(MOS or IC3) before graduation under the
Innovation Economy model policy.



Keywords
-

good citizen, netiquette, digital literacy and competency, employability, illegal downloads;
sexting
, plagiarism.
Net influencers






Image courtesy of FOX http://
www.avatarmovie.com/index.html

Project 1: Youth

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

2.
COMMUNITY PROGRAM


Community Broadband Centre (CBC)



CONCERNS


Accessed to unauthorized websites,
digital divide
,

spam and
scams



STATISTICS


85%

of rural voters voted for government; only 20% of rural population have access to computers currently; by
2012, 62%
rural folks will have access to a digital touch
-
points and by 2015 80%. Main activities of current CBC’s are
entertainment
(80% are on YouTube), e
-
government (18%);



PROJECT
BRIEF


As part of the
Digital Divide
and Literacy program initiatives, Malaysia is building
1000

Community Broadband Centre
(CBC)
in villages
across the country by 2011 under the Universal Service Provider (
USP
) fund project. The project allows
rural community to access
the Internet
to all its members at a minimum cost. Initial statistics show a worrying trend of the Internet being abused. As part of the
Access Monitoring Systems project, passing
the ‘L
-
License

Netizenship

certification
will now become a prerequisite for membership.
Netizenship

will initially be offered as an
INDEPENDENT MODULE
and eventually integrated with
IC3

(
Bahasa

version) in later phases.



Keywords



digital divide, literacy and mindshare, Internet filtering

Project 2: Community

http://
www.tel enor.com
/en/corporate
-
responsibility/initi atives
-
worldwide/
DiGi
-
connects
-
rural
-
areas
-
across
-
Mal aysia

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

3.
TEACHER TRAINING PROGRAM


Integrating ‘
Netizenship
’ in the

Pre
-
service Teacher Curriculum.



CONCERNS


Students not guided and facilitated;
knowledge gap
in digital

literacy between teacher and students are too wide.



STATISTICS


78% teens

says Internet helps them to do their
schoolwork; 93% of parents
agree that Internet help children to learn; 96%
of teachers agree that knowledge of and use of he Internet is essential aspect of
learning
;
50% kids
have
exposure to porn
or
cyber Bullying
intentionally or unintentionally



PROJECT BRIEF


The Ministry has invested heavily in the
digitization of education
in the past 5 years under the
Mathematics & Science in
English
project.
All schools
are now connected with the Internet and
all teachers
have been equipped with a notebook for
T&L. There has been an increase in the cases of
Cyber Bullying
and illegal downloading of ‘garbage’ from the internet.


As a
sustainable strategy
, the Ministry is looking at integrating the modules of Netizenship in curriculum at
ALL Teacher
Training Institute

that produce new teachers. A new compulsory subject ‘Netizenship’ will be taught and

passing
Netizenship
module is required
prerequisite

for all pre
-
service teachers. A similar initiative is being considered for all post
-
service teachers starting with the training of 2000 teachers as
Master Trainers
.



Keywords



digital literacy & competency,



Image courtesy of Yahoo News http://
news.yahoo.com

Project 3: Teacher

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

4.
CIVIL SERVANTS


Civil Servant Literacy & Netiquette project



CONCERNS


Lost of productivity
, illegal downloads, accountability, AUP



STATISTICS


Shopping

is the most popular online activity at work (75%); 22% have purchase online at work; e
-
Bay the Internet; 39%
use the Internet
for online banking
; Adults will do more
online transaction
if they can be assured of safety on the
Internets busiest traffic is during office hours (68%); 75% don’t like sending personal or credit card info over




PROJECT BRIEF


As part of the
e
-
Government initiatives, the government is pushing for a minimum credential for all
civll

servants in
Malaysia. Their previous approach of developing their own programs is seen as not scalable. The government is also
increasingly concern about the rise in trends of civil servants being caught visiting external ‘unprotected’ site and loss of

productivity from activities not sanctioned during office hours.



Keywords



digital literacy & competency, online transaction


Image courtesy of Yahoo News http://
news.yahoo.com

Project 4: Civil Servant

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Copyright © 2011 Prestariang | Confidential and Proprietary

We Train and Certify
Professionals
TM

Thank You