Journal Post #6

How has cyber technology created opportunities for workplace deviance?

Workplace deviance is an extremely important topic as the misuse can lead to multiple negative outcome for the individual and organization. Due to the evolution of Cyber Technology there has been a significant misuse in information and communication in technology among the workplace. Workplace deviance can start out as a minor misuse and eventually escalating to something that could negatively effect an entire organization. Whether a business is small or large many organization experience workplace deviance at many different levels. This is due to companies not implementing the best security techniques in response to workplace deviance.

Workplace deviance is voluntary behavior that violates an organization’s policies or norms and threatens the well-being of the organization in many aspects. This form of misuse of technology can be seen as sending personal emails from the company account and internet searches involving personal aspects. As you can see the risks from workplace deviance can range from low to very high.

Employees become more susceptible to workplace deviance when companies do not emphasize the importance of security measures. Employees are also more susceptible to workplace deviance when companies do not take correct actions to ensure the safety of the company. If companies require excessive training on workplace deviance we would most likely see a significant reduction. I do feel as though it is the company or organization’s responsibility to educate and train themselves along with their employees on the importance of following precautions to avoid workplace deviance.

Workplace deviance for the most part is quite troublesome for companies as long term misuse of communication and technology can lead to significant financial and reputational damage. Although, short term misuse of communication and technology can be beneficial to other companies as they can provide workplaces with future long-term security practices and protection from any type of corruption. 

Leave a Reply

Your email address will not be published. Required fields are marked *