Journal Entry #3
Today, every discipline relies on computer systems in some way which has created new opportunities for insider threats. Nearly every discipline collects and saves vast amounts of data about their customers. Insiders who have access to this data could exploit it and this could be a serious cost to the employer. Some methods of employee cyber deviance include:
- Unauthorized Access: Accessing the system to get information that is not required for their job. For example, looking up a customer’s personally identifiable information to steal their identity.
- Misuse of Information: An employee locates proprietary information for the purpose of selling or misusing the information obtained.
- Inappropriate Use of Company IT Resources: Employees could work on their e-bay business during business hours.
- Inappropriate or Offensive Online Communication: This one would be more difficult, as sending an inappropriate message provides documentation of cyber deviance.
- Cyberloafing: Without proper security, employees could spend time on the internet while they should be working.
- Identity Deception: An insider could misrepresent themselves to gain access to information. A news item I read about many years ago was the case of Joyce Meyer’s (ministry speaker) bodyguard. He exploited the email system and sent himself family death threats. He murdered his wife and children so that he could be with his girlfriend without losing his job.
- Data Hoarding: An example would be keeping a list of banking account numbers or other sensitive data.
- Digital Piracy: A person working in a field such as publications or music could illegally copy products for resale.
- Malware: An insider could spread a worm or virus with their access to the company network.
White collar cybercrime is also on the rise and is when cybercrime occurs in a business. Legitimate white-collar cybercrimes are committed while on the job. An example would be hacking into a computer or application without authorization for the purpose of stealing information. Contrepreneurial white-collar cybercrimes are committed through an illegal enterprise. An example would be a company making counterfeit goods to sell under a famous brand. This would be easy to sell on Amazon or e-bay!
References
Module 3
Jones, John. (2023, Special Edition). Employee Cybercrime and Deviance. Loss Prevention Magazine. pp. 14-16. Special Innovation Edition 2023 by Loss Prevention Magazine – Issuu