Entry #3

How has cyber technology created opportunities for workplace deviance?

As people have gotten smarter and more creative with the way they steal information, especially as nearly all information is now stored somewhere is cyberspace, workplace deviance, like insider threats, have become more prevalent. Insider threats are one of the most common attacks on a business and can be easy to execute. Once a threat has entered the workspace, they have access to many valuable assets like computers, networks, files, and floor layouts. An attack could also be as simple as plugging in a flash drive with malicious software installed into one of the business computers. Attacks could also be physical attacks, like the attack on the Pacific Gas and Electric station, where information like building layouts become very valuable. In these types of cases, sometimes the attacker doesn’t even care about taking anything, but rather destroying something either to make a statement or as an attempt to cripple a company. There are also entire businesses built on the idea of workplace deviance like scam centers. Employees at these businesses are hired purely to scam people out of small or large sums of money or information about them. Employees use phone calls and emails to trick unexpecting people into giving away something that is theirs. Employees also use technology to gain information about a person by doing reconnaissance before the call even starts or while the car starts. There are many resources online that can give information about somebody for free, like their address and family members, which can be used during the phone call to build credibility for the scammer as they pretend to be somebody who should have all of this information. Even as technology continues to become more secure, that same advancement of technology will always allow hackers to find a way through. Lastly, with conflict between countries, some countries will pay insiders to collect or destroy information. A reward for the want of information, caused by cyber technology, can act as an incentive for somebody to become deviant.

Leave a Reply

Your email address will not be published. Required fields are marked *