Computer Technology: Ethical Issues and Codes Essay

Free Articles

Computer and networking tools provide considerable possible and capableness chiefly as a agency for communicating. cooperation. and as bringing intercession. Internet users. for case. benefit from the independency of transporting out assorted minutess. every bit good as guidance. through the Net. With this autonomy. though. comes a important answerability to use computing machines and the Internet particularly. in a manner which is secure. safe. ethical. and makes part to the general public assistance of those involved.

Counselors should perpetrate themselves to cognizing and being cognizant of the hazards involved in using computing machines and using the cyberspace expressway. Sabella. R. A. ( 1999 ) noted what the computing machine and Internet engineerings have generated comparative to reding issues: dependence of the cyberspace. handiness. erotica. sexual torment online. safety. and security. With turning reactivity. counsellors can be more effectual in doing determinations sing their behaviour and calculating online.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

One important issue of ethical computing machine use is the affair of confidentiality. The relationship of counsellor and client is confidential and involves conformance with ethical criterions. policies and Torahs associating to confidentiality. In Computer. moralss. and the school counsellor ( 1988 ) . Mudore presented a figure of recommendations for counsellors for safeguarding the privateness of records and doing certain that the information is merely accessed by authorised individuals.

These recommendations include: maintaining the computing machine in a private country in order that pupil information can be keyed in confidentially ; seting guidance records associating to student information on a backup storage disc ; taging reding discs in codification alternatively of taging them “Student Information or Student Data ; ” protecting unauthorised copying of discs by detaching disc checks. procuring up discs. and non allowing discs to be taken out from their storage location ; encoding a watchword before a computing machine can be opened to forestall unauthorised entree on the difficult thrust ; speaking to other staff to convey concerns sing privateness ; and informing the school community sing the challenges and issues generated by computing machine engineering.

It was besides recommended by Sampson and Pyle ( 1983 ) that: merely vital and indispensable information are kept ; the information is accurate ; the informations are destroyed when these are no longer necessary to supply services ; separate identifiable informations is non maintained to which there is computing machine web entree ; and. separate identifiable information is non utilised for research grounds without the permission and blessing of those who provided the information. Word processing plans and database plans are presents equipped with the ability to supply a file watchword. The benefit to these package plans is that if there is a watchword assign to the file. the file is encrypted in codification and made it indecipherable.

Even though there is a possibility of checking or choping the codification. it would take well wide programming cognition in computing machine and entree to the encrypted files. The disadvantage of using this security facet is that if the assigned watchword is forgotten by the counsellor. so it is besides pose a trouble for the counsellor to recover and entree the file. It is. hence. indispensable to compose down watchwords and consequently put them in secure and safe entree. It is similarly necessary to alter watchwords at regular intervals to farther prevent violation of confidentiality in the juncture a information file is stolen or unauthorised entree.

Passwords. on the other manus. should non be created by using such characters as names. adjectives or birthdays that are rather obvious and easy deciphered. Passwords should be created utilizing a combination of Numberss and letters that are rather hard if non impossible to decrypt and check. Even though security steps and encoding have extremely become sophisticated. illegal and unpermitted entree to online communications continues to be a possibility without greater attending to security methods. Counselors who efficaciously pattern online must non merely lawfully protect but ethically safeguard their clients. themselves and their profession by using all available and necessary security processs.

Other likely issues in utilizing computing machine engineering include: Competence. The counsellor and the client should be sufficiently computing machine literate for the web environment to go a feasible synergistic guidance medium ; Specific Locations. A possible deficiency of comprehension on the portion of distant counsellors of conditions. cultural issues. and events associating to specific locations that influence clients may restrict credibleness of a counsellor or may take to unsuitable intercessions in guidance ; Equitable Access. Does the monetary value of on-line entree present another hindrance for acquiring clasp of reding? Does online reding estrange further prospective clients who most perchance necessitate guidance?

Though holding entree to the Net. can a client proficiently engage online reding without holding a computing machine experience? Online reding appears to worsen just issues already covering face to confront guidance. Credential. How will licence Torahs and enfranchisement apply to the World Wide Web as province boundary lines are electronically crossed over? Will counsellors be needed to be licensed and certified in all provinces or states where the clients are situated? Will online reding truly be the push for a national certificate acknowledged by all provinces? Is at that place a necessity to travel for worldwide credentialing? Who will oversee international or out of province ailments? Cyber Care.

Can counsellors advance the promotion of existent working relationships. lovingness and swearing on the Net? Cyber Client individuality. Make you truly cognize your on-line client? Does the client show himself or herself as an grownup but in fact is a minor? Could the client have disguised his or her race. gender. or other personal information that could endanger the soundness or dependability of the counselor’s attempts? Counselors can do the dip into cyberworld and use present ethical criterions and guidelines to transport out themselves in an ethical mode. Issues exist nevertheless but surely the hereafter will supply a platform in what signifies to be ethical as the precise nature of online guidance is learned.

Post a Comment

Your email address will not be published. Required fields are marked *

*

x

Hi!
I'm Katy

Would you like to get such a paper? How about receiving a customized one?

Check it out