{"id":295,"date":"2023-02-20T02:46:31","date_gmt":"2023-02-20T02:46:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aanob001\/?p=295"},"modified":"2023-04-24T04:08:26","modified_gmt":"2023-04-24T04:08:26","slug":"journal-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aanob001\/2023\/02\/20\/journal-6\/","title":{"rendered":"<strong>How has cyber technology created opportunities for workplace deviance?<\/strong>"},"content":{"rendered":"\n<p>This week, we focused on cybersecurity in the workplace. Cybersecurity in the workplace can be very beneficial. It helps protect the company, the employees, customers, and business partners. With cybersecurity it ensures that important information is protected. With the benefits of cybersecurity also comes with its costs. One of these costs is known as workplace deviance. \u201cDeviance refers to rule-breaking behavior of some kind which fails to conform to the norms and expectations of a particular society or social group\u201d (ReviseSociolgy). In other words, deviance focuses on the induvial and their acts and how it deviates from societal or community norms. Cyber devaicne can be defined as \u201cinappropriate or criminal behavior in a digital context.\u201d (Oakley, Salam 2012). Workplace deviance focuses on the criminal behavior those who work within the corporation\/business. Moreover, this is done purposely so that the business and more vulnerable to these attacks; \u201cworkplace deviance is a planned, purposeful, and hateful attempt to disrupt an organization.\u201d (Contributor, 2020). &nbsp;Cybersecurity and technology have created opportunities for employees to abuse their power and property. This includes abusing credentials, damaging the company\u2019s equipment and more. Company politics also play a role in workplace deviance. Some employees may have different views from other that can result in tension and rumors in the company. Furthermore, it can lead to employees trying to sabotage each other which can put the company in risk of more cyber-attacks. &nbsp;cyber technology gives power to those who have been wronged by a company. With that, the former employee has the power to acquire sensitive information and use it against the company\u2019s discretion. As cyber technology becomes more and more advanced, it becomes more and more harder to find people who are involved in these deviant acts. With that, it could cause more damage to the company, big or small.<\/p>\n\n\n\n<p><a href=\"https:\/\/smallbusiness.chron.com\/common-kinds-workplace-deviance-10178.html\">https:\/\/smallbusiness.chron.com\/common-kinds-workplace-deviance-10178.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/aisel.aisnet.org\/sighci2012\/7\/#:~:text=Research%20in%20criminology%2C%20sociology%2C%20and,2010).\">https:\/\/aisel.aisnet.org\/sighci2012\/7\/#:~:text=Research%20in%20criminology%2C%20sociology%2C%20and,2010).<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-revisesociology wp-block-embed-revisesociology\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"aa534KDMAe\"><a href=\"https:\/\/revisesociology.com\/2020\/10\/28\/what-is-deviance\/\">What is Deviance?<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;What is Deviance?&#8221; &#8212; ReviseSociology\" src=\"https:\/\/revisesociology.com\/2020\/10\/28\/what-is-deviance\/embed\/#?secret=8G347myfiX#?secret=aa534KDMAe\" data-secret=\"aa534KDMAe\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>This week, we focused on cybersecurity in the workplace. Cybersecurity in the workplace can be very beneficial. It helps protect the company, the employees, customers, and business partners. With cybersecurity it ensures that important information is protected. With the benefits of cybersecurity also comes with its costs. One of these costs is known as workplace&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aanob001\/2023\/02\/20\/journal-6\/\">Read More<\/a><\/div>\n","protected":false},"author":25769,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/users\/25769"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/posts\/295\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aanob001\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}