How has cyber technology created opportunities for workplace deviance?

According to the Oxford Dictionary, deviance is “the act or state of departing from conventional or accepted standards, especially in social or sexual behavior.” In the cyber technology business, workplace deviance is more likely to occur since it may occur via the web rather than face to face, making it more difficult to detect. When an employee is unsatisfied with his or her employer, regardless of whether he or she was dismissed or thinks he or she was owed something, such as a promotion, the employee is apt to lash out against the company. If an employee is let go from a job in the cyber technology sector, for example, he may download important information and sell it to competing firms for financial gain if he done so prior to his departure. If the employee’s authorization to return to work is not restricted, he may continue to do harm to the business. Since a consequence, this would be deemed workplace deviance, as it violates the firm’s behavioral norms.

 Employees that are disgruntled with their employment disable their security systems, exposing the firm to attack in another instance of workplace cyber technology deviance. As a consequence, the firm would be exposed to hackers entering the system and stealing vital data. Because it is significantly more difficult to trace down a person engaging in damaging behavior behind a computer screen than it is to hunt down a person who is physically there and may be seen on a surveillance camera, for example, cyber technology has created new possibilities. This allows the person to do more damage for a longer period of time before being found. In general, cyber technology has increased the likelihood of workplace deviance occurring, while also making it easier to commit and more difficult to detect. While workplace deviance will always exist in all types of occupations, the usage of cyber technology simplifies the act of engaging in deviant conduct.

Leave a Reply

Your email address will not be published. Required fields are marked *