How has cyber technology created opportunities for workplace deviance?

Information and communication technologies (ICT) have facilitated interactions, access to information and made it possible to store a large amount of data. Today, if the Internet is used to communicate, it is also used to share, sell, buy: this phenomenon designated by the term "disintermediation" allows the reader to enter directly into contact with the author, the buyer with the seller, the citizen with the politician, situation made possible by the democratization of the Web. According to statistics from the International Telecommunication Union, around 3.2 billion people use the Internet, 80% of them in developed countries.
If this new form of communication is successful, we also note that more and more individuals are choosing to disconnect from the Internet and in particular to desert social networks: users say they no longer feel "safe" and deplore the absence of privacy; they feel they have lost control of the data that they have, in a majority of cases, submitted themselves to others.Nowadays, there are many phenomena on the Internet which plunge the individual into a humiliation suffered, acts which it is possible to qualify as cyber-crimes or even e-crimes. : thus, theft of bank data, theft of email and identity, intrusion into systems and data breaches are all examples of viral attacks now visible in the virtual world. If these offenses are not necessarily new (such as theft, fraud, illegal betting, etc.), their perpetrators seem to take advantage of the opportunities offered by new technologies in order to extend these crimes to the whole world, thus causing considerable damage. more important: for Interpol, cyber criminals would benefit from the speed, the anonymity allowed by Internet, but also from the in existence of border between the real and virtual worlds to commit a significant number of activities outside the law. The police organization in question lists three types of cyber-crime: attacks against computers and computer programs (intrusion into the network, sending of malware); financial crime and corruption (Internet fraud, phishing); and finally, crimes of abuse and mistreatment (crimes against children, exploitation and sexual predation).