{"id":283,"date":"2021-04-28T05:30:01","date_gmt":"2021-04-28T05:30:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dshep008\/?p=283"},"modified":"2021-04-28T05:30:02","modified_gmt":"2021-04-28T05:30:02","slug":"journal-entry-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dshep008\/2021\/04\/28\/journal-entry-6\/","title":{"rendered":"Journal Entry #6"},"content":{"rendered":"\n<p>Workplace deviance\u00a0is defined as a deliberate plan to sabotage a corporation by causing problems within.\u00a0 Today, crime can occur in an informal way with the use of a computer.\u00a0 Tech-savvy criminals are able to unlawfully acquire information online with the push of a button.\u00a0 Day by day these harmful acts have become easier with the use of cyber technology. High-tech criminals use\u00a0malware tools to set up their attacks. Malware, or malicious software, infiltrates and gains control over a computer system or a mobile device to steal treasured information or damage data. Because of advancements in technology, criminals can use the advantage of accessing information from several places while sitting in the comfort of their cubicle or home office.\u00a0 This makes it much harder to find the person while in the act. \u00a0 An example of workplace deviance is when an angry employee gives confidential data away in exchange for monetary gain.\u00a0 This behavior is the opposite of workplace expectations.\u00a0 Another example of deviance is when an employee knowingly leaves the company security system unlocked and at risk for attack. \u00a0 This would leave the company open to potential threats and security breaches.\u00a0 Having communication between employer and employees, strategic hiring selection, and training are ways to reduce workplace deviance. Requiring employees to work in pairs and installing camera systems that monitor activity can be helpful as well.\u00a0 Overall, most companies conduct background checks, but there is always the potential for sabotage.\u00a0 In addition, there are minimal to no laws to address many of these behaviors. The\u00a0FBI\u00a0has specially trained\u00a0cyber\u00a0squads across the country in each of their field offices, working hand-in-hand with interagency task force partners. The rapid-response\u00a0Cyber\u00a0Action Team can position across the United States within hours to respond to major incidents.\u00a0 The war continues against cybercrime and as a result, organizations spend billions of dollars to defend themselves from cyber attacks that can occur outside and from within.\u00a0\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Workplace deviance\u00a0is defined as a deliberate plan to sabotage a corporation by causing problems within.\u00a0 Today, crime can occur in an informal way with the use of a computer.\u00a0 Tech-savvy criminals are able to unlawfully acquire information online with the push of a button.\u00a0 Day by day these harmful acts have become easier with the [&hellip;]<\/p>\n","protected":false},"author":19853,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/posts\/283"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/users\/19853"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/posts\/283\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/posts\/283\/revisions\/284"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/media?parent=283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/categories?post=283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dshep008\/wp-json\/wp\/v2\/tags?post=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}