skip to main content
10.1145/3326365.3326408acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article

The Development of the Digital Wellness Toolkit

Authors Info & Claims
Published:03 April 2019Publication History

ABSTRACT

The advent of Information and Communication Technologies have brought with it numerous advantages and disadvantages. One area of concern relates to wellbeing in a digital environment: issues regarding cyber safety and cyber safety, although prevalent, are not frequently addressed in school curricula in South Africa. Faced by a lack of training material for schools and communities on cyber safety and security, and drawing from its experience in the tertiary environment, the African Centre of Excellence for Information Ethics developed the Digital Wellness Toolkit. This toolkit seeks to address this gap on four levels: pre-primary age; primary school; secondary school and local community training. In so doing, the role of the South African government is underscored, since by creating and disseminating training programmes on the ethics of emerging technologies, it realises its responsibility towards eGovernance. This paper provides an overview of the history of the development of the Digital Wellness Toolkit together with a discussion of the theoretical and methodological approaches to the design of the various Digital Wellness curricula which form part of the toolkit.

References

  1. Toni Carbo and Stephen Almagno. 2001. Information ethics: the duty, privilege and challenge of educating information professionals. Library Trends 49, 3 (Winter 2001) 510--518.Google ScholarGoogle Scholar
  2. Chien-Pen Chuang and Joseph C. Chen. 1999. Issues in information ethics and educational policies for the coming age. Journal of Industrial Technology 15, 4 (Aug. 1999), 1--6.Google ScholarGoogle Scholar
  3. John S. Hammond, Ralph L. Keeny and Howard Raiffa. 1998. The hidden traps in decision making. Harvard business review 76, 5 (Sep. 1998), 47--58.Google ScholarGoogle Scholar
  4. World Summit on the Information Society. 2003. WSIS Vision Statements 1 - 58. Retrieved from: http://www.itu.int/net/wsis/docs/geneva/official/dop.htmlGoogle ScholarGoogle Scholar
  5. Ivy Matsepe-Casaburri. 2007. Available from: http://www.polity.org.za/article/matepecassabri-opening-of-nepad-eafrica-commission-offices-0742004-2004-04-07-1.Google ScholarGoogle Scholar
  6. INTEL. 2014. Executive Summary of the INTEL Digital Safety and Security Curriculum, Johannesburg, South Africa.Google ScholarGoogle Scholar
  7. Coetzee Bester. 2010. Intercultural Information Ethics in the Global Information Eco-system: Opportunities and challenges in Africa. Paper delivered at ASIST conference. 27 October 2010. Pittsburgh, United States of America.Google ScholarGoogle Scholar
  8. Coetzee Bester. 2012. Current position of the curriculum to teach Information Ethics in Africa. An Overview to the Nairobi Workshop on 3 June 2012. Organised by the Africa Network for Information Ethics (ANIE) and the African Centre of Excellence for Information Ethics (ACEIE).Google ScholarGoogle Scholar
  9. Department of Education. White Paper on e-Education. Transforming Learning and Teaching through Information and Communication technologies. Notice 1922 of 2004. Government Gazette No. 26762. September 2004Google ScholarGoogle Scholar
  10. Department of Education. Guidelines for Teacher Training and Professional Development in ICT. Department of Education, Pretoria, South Africa.Google ScholarGoogle Scholar
  11. Department of Basic Education. 2011. Integrated Strategic Planning Framework for teacher Education and development in South Africa (2011-2025). Department of Basic Education, Pretoria, South Africa.Google ScholarGoogle Scholar
  12. Susanna Ackermann. 2014. INTEL Digital Safety and Security Curriculum. Conference Paper. INTEL Cyber Safety and Security Conference. Cape Town; 8 October 2014.Google ScholarGoogle Scholar
  13. Coetzee Bester. 2014. INTEL. Access to safe information and safe access to information. Conference Paper. INTEL Cyber Safety and Security Conference. Cape Town; 8 October 2014.Google ScholarGoogle Scholar
  14. Decker F. Walker. 1971. A naturalistic model for curriculum development. The school review, 80, 1 (Nov. 1971), 51--65.Google ScholarGoogle Scholar
  15. Department of Telecommunications and Postal Services. 2014. Memorandum of Agreement with the University of Pretoria, Pretoria, South Africa.Google ScholarGoogle Scholar
  16. Suné von Solms and Rachel Fischer. Digital Wellness: Concepts of Cybersecurity Presented Visually for Children. In Proceedings of the International Symposium on Human Aspects of Information Security & Assurance, Adelaide, Australia, 28-30 November 2017 (HAISA 2017), 156--166 from: https://www.cscan.org/openaccess/?id=350Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICEGOV '19: Proceedings of the 12th International Conference on Theory and Practice of Electronic Governance
    April 2019
    538 pages
    ISBN:9781450366441
    DOI:10.1145/3326365

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 3 April 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    ICEGOV '19 Paper Acceptance Rate81of171submissions,47%Overall Acceptance Rate350of865submissions,40%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader