Entry #3

How has cyber technology created opportunities for workplace deviance?

To answer this question of opportunity, it is first important to understand that just because someone or something can act, does not mean they also have the capability or intent to do so. Without all three variables being present, action may not be taken. Opportunity is simply one element among the three which is the easiest to find. Cyber technologies are incredible tools that have granted us the ability to have almost zero latency communications with anyone worldwide. With so much power it is important to implement safeguards to keep work and play safe for everyone.

Let us nail down the first point about opportunity made in the first couple sentences, by looking at a common piece of cyber technology in use today, Email. When we have communications with someone within our company, it is important if not crucial to ensure that we are communicating with whom we think we are sending a message. Certificates, another piece of cyber technology, are given by our organization to each individual member. These certificates prove we are who we say we are and may show up in emails as a ribbon. Clicking on the users’ authentication certificate can give you useful information such as their work email as well as the expiration date of the certificate. Having a digital certificate removes the opportunity to take deviant action, at least, without being caught immediately. Certificates are tied directly to the user, so deviant actions can immediately be tied to the culprit and are an example of an organization removing the opportunity for workplace deviance.

An example of unchecked opportunity in the workplace comes in the form of an unattended, unlocked desktop computer or laptop. A common way of mitigating this vulnerability in the DOD is by providing annual training on the importance of removing your Common Access Card before leaving your system unattended. To leave a CAC in a logged-in system unattended is a great real-life example of an opportunity for workplace deviance. A third party could use this opportunity to open your email and tell all your coworkers, with your authentication certificate attached, that you are putting in your 2 weeks’ notice. What a nasty surprise to come back to.

Leave a Reply

Your email address will not be published. Required fields are marked *