One way that cyber technology has created an opportunity for workplace deviance is in the selling of personal information from customer stored onto company computers such as in the healthcare field. The employees of these businesses are properly trained and cleared for their job however at least 1/5 of employees have said that they would sell confidential information to an authorized user, even after being trained to not do this. This threat also increases with the termination of an employee who may lash out on the company in turn. Employees wouldn’t have access to this information if it wasn’t for the company allowing them access. They are also breaking ethical boundaries when selling personal information that their company stores. Cyber technology usually requires the employee or user to have a strong password for the company applications and systems. When a system has a weak password, it is much easier for an attack to occur through that account which can impact the entire system. This can expose personal client information, security measures, company information, and can result even in the loss of human life among other outcomes. Just like it is people who prevent cybersecurity attacks it is also people who open the door for workplace deviance with the aid of cybersecurity. Another thing that opens the doors for workplace deviance is not having the proper security to block certain sites from user access in the workplace such as social media websites. These sites can lead to the compromise of company information and attacks on the company by attackers getting in when the employee uses a site not approved for use on a company computer. Another way that deviance may be created is when everyone in the workplace is not held accountable. When there is favoritism among employees from higher ups, they can get out of trouble which can then make them think they can do whatever they want with no consequences. This assumption of freedom from the employee leads to a higher potential of attacks through their company account.
Leave a Reply