While conducting research, I found that workplace deviance is defined as a means deliberate, malicious attempts to sabotage an organization by causing problems in the workplace. It can also be defined as voluntary behavior that violates significant norms and in so doing threatens the well being of an organization and the workers. Workplace deviance can take the form of aggressive behavior. The rise in cyber technology has created more opportunities for workplace deviance to occur. This is due to the insider threats within a company or an organization. Cyber loafing is an example of a type of work place deviance that occurs. The sense of being invisible gives the person more confidence to do or say more than they usually would. Not only does it make them invisible but harassing someone from behind a screen is completely different than doing it face to face. Not being face to face usually give the person extra strength to be more brutal because they do not have to take responsibility for their actions. On another said of things they could take the idea of behind the screen to a whole new level. They could steal information about the company or even steal personal information about other people. Cyber technology is allowing workers to use work phones or computers to access their personal information during work hours. Workplace deviance is unproductive behavior, so things like taking advantage of the Internet for personal use falls under this. In order to promote a more safe and secure environment for the use of cyber technology; companies must place training blocks in their way of operation to make sure all members of the team are aware of what can potentially happen if there were to ever be such an attack on their data. Thus being said, workplace deviance can be very impactful if not taken seriously.
FREE WRITING ASSIGNMENT
Create a start up
Yacht software
Biometric readers; setting them up
Embezzlement detector; being able to teach others to use them.
Reorchestrating
Security auditing
Encrypting information for companies
Creating a risk-free programs
Uninstalling the software
Restoring information lost
Interface machines
Track hackers
YouTube videos teaching people how to code.