Entry 3

on

Cyber technology has created opportunities for workplace deviance by giving a user too much access to certain programs, technologies, or applications. Depending on the level of trust or level of cybersecurity from the workplace, an employee can easily use a work computer as a home or personal computer. This opens many avenues for cyber threats and overall damage to one’s business, specifically if they’re using the internet, the internet is a global platform and open to anyone. Employees could either knowingly or unknowingly be causing harm to a companies’ network simply by visiting malicious sites or clicking open links on their personal emails. They are also able to do such things as “cyberloafing” or using a computer for non-work-related tasks such as checking social media, playing video games, streaming videos, playing music, and uploading and downloading files or applications. All of which could have computer viruses attached to them. This could cause damage to your network or systems and again, either unknowingly or knowingly. Also, while employees do such things they aren’t very productive and efficient in their work, costing time and money for the people they work for. Employees purposefully causing property damage could gain access to things they have no permission or authorization to use. This would cost a business, their data or sensitive information and even a company’s finances. Other deviances could be cyberbullying or harassing other employees through email or text through social media. Not to mention spreading rumors or false information about another colleague to simply harass or destroy someone’s image for gain in the workplace. For example, an open spot for promotion or job position, making others look bad to make themselves look like the better option. Another deviance of the workplace could be cyber espionage, stealing trade secrets or sensitive company information. Technology in the workplace can be as harmful as it is helpful and should be monitored.        

Leave a Reply

Your email address will not be published. Required fields are marked *