{"id":337,"date":"2021-04-28T22:07:55","date_gmt":"2021-04-28T22:07:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/byeab001\/?p=337"},"modified":"2021-04-28T22:07:56","modified_gmt":"2021-04-28T22:07:56","slug":"eportfolio-entry-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/byeab001\/2021\/04\/28\/eportfolio-entry-6\/","title":{"rendered":"ePortfolio entry #6"},"content":{"rendered":"\n<p>1.<strong>How has cyber technology created opportunities for workplace deviance?<\/strong><\/p>\n\n\n\n<p>Workplace deviance can happen anywhere in this context workplace deviance is taking&nbsp;place&nbsp;in the cyber technology field.&nbsp;Deviance is defined as the \u201cFact or state of departing from usual or accepted standards in&nbsp;society\u201d&nbsp;and workplace deviance is described as the deliberate desire to cause harm to an organization for&nbsp;whatever&nbsp;reason.&nbsp;Workplace deviance is happening frequently in the cyber field.&nbsp;One of the questions that should arise from&nbsp;this is why&nbsp;the deviance is taking&nbsp;place?&nbsp;For&nbsp;example, if an employee&nbsp;was fired from their job and still had access&nbsp;to the company that employee now has the power to cause harm&nbsp;to the company.&nbsp;One of the reasons cyber technology has created&nbsp;workplace&nbsp;deviance is&nbsp;that it has&nbsp;opened&nbsp;a new&nbsp;opportunity&nbsp;to the one carrying the&nbsp;deviant&nbsp;behavior making it hard to catch them since they are behind a computer and not&nbsp;in&nbsp;person.&nbsp;Another&nbsp;scenario, in this case, is if an&nbsp;employee&nbsp;is not&nbsp;satisfied&nbsp;with the company or if he\/she got fired they can take&nbsp;sensitive&nbsp;information from the company&nbsp;and&nbsp;sell it to another&nbsp;organization&nbsp;for profit, this scenario can be seen as&nbsp;how&nbsp;cyber technology has opened opportunities&nbsp;for&nbsp;workplace&nbsp;deviance.&nbsp;In cyber technology, deviance&nbsp;can be&nbsp;easily seen&nbsp;compared&nbsp;to other non-cyber technology jobs&nbsp;because in the cyber field&nbsp;information can easily be taken from the inside.&nbsp;Employees&nbsp;engaging in a deviant&nbsp;workplace&nbsp;can have&nbsp;detrimental&nbsp;consequences to the&nbsp;organization, and&nbsp;that\u2019s why there are methods to reduce deviant behaviors. Some of the methods are communications, this will&nbsp;open a door to better understand the&nbsp;employee,&nbsp;Training&nbsp;is also another&nbsp;method&nbsp;that provides&nbsp;better&nbsp;self-control&nbsp;and regulates unwanted emotions. Overall cyber technology creates workplace deviance&nbsp;because it is easier to do, and harder to catch&nbsp;whoever is responsible.&nbsp;Workplace&nbsp;deviance will always happen in all jobs, however cyber technology opens a whole lot of doors&nbsp;compared&nbsp;to other jobs.&nbsp;&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.How has cyber technology created opportunities for workplace deviance? Workplace deviance can happen anywhere in this context workplace deviance is taking&nbsp;place&nbsp;in the cyber technology field.&nbsp;Deviance is defined as the \u201cFact or state of departing from usual or accepted standards in&nbsp;society\u201d&nbsp;and workplace deviance is described as the deliberate desire to cause harm to an organization for&nbsp;whatever&nbsp;reason.&nbsp;Workplace&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/byeab001\/2021\/04\/28\/eportfolio-entry-6\/\">Read More<\/a><\/div>\n","protected":false},"author":16668,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/337"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/users\/16668"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/comments?post=337"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/337\/revisions"}],"predecessor-version":[{"id":338,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/337\/revisions\/338"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/media?parent=337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/categories?post=337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/tags?post=337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}