Cyber Technology has created and evolved new and old means of workplace deviance. Workplace deviance can be described essentially as a worker breaking the rules or not upholding their responsibilities. Whether that be neglecting their job due to distractions or purposefully causing harm to their corporation, cyber technology has greatly increased the ease in which deviance can occur. Slide six of the “Engineering, Critical Infrastructure and Cybersecurity” PowerPoint breaks workplace deviance into four categories: Political, Personal, Production, and Property.

Political Deviance: This form of deviance in the workplace is explained as “spreading rumors, showing favoritism, and backstabbing.” As these concepts have always existed within the workplace, technology makes it easier and more effective for employees to practice them. Co-workers can text and spread rumors without being at work, show favoritism through exclusion of other workers in online groups and more.
Personal Deviance: This form of deviance is described as “sexual
harassment, verbal abuse, and physical assault.” Again, these concepts have always existed but technology has evolved them. Employees can sexually harass others through their phones without being at work, through unwanted sexual text messages or photos. The potential for abuse through e-mail, text message, phone calls, or social media is large, and it is very easy for anyone to post a harmful message about others online.

Production Deviance: This form of deviance is described as “absenteeism, lateness, and withholding effort.” Technology creates a mass amount of opportunity to withhold effort. Whether it be texting or playing on their phone at work, or even playing games, online shopping, or watching shows on their computer or other devices.
Property Deviance: This form of deviance is described as “theft, sabotage, and vandalism.” Technology opens new windows within these categories. Employees can sabotage or vandalize online systems such as inventory managers transaction logs. Employees could change inventory logs for items at their company and take items for free, granted they could do it without getting caught.