How Has Cyber Technology Created Opportunities For Workplace Deviance?

Cybertechnology has created countless opportunities for workplace deviance due to information technologies continual and rapid growth. Deviance is defined as quality, state, or behavior that differs from what is normal or accepted, per the Merriam-Webster dictionary. Within the workplace perpetrators attempt to take advantage of their capabilities by engaging in cyber offenses against the company and their peers. An example of a cyber offense is cyberbullying. The Cyberbullying Research Center describes cyberbullying as the “willful and repeated harm inflicted through the usage of computers, cell phones, and other electronic devices.” To further understand instances of cyberstalking and cyberharrassment, Michigan Tech offers excellent definitions of the two. Cyberstalking utilizes technological devices to stalk. It refers to a pattern of threatening or malicious behaviors, with a perceived and very credible threat of harm. Cyber-harassment usually does not involve a credible threat, but rather involves unconsented conduct, such as threatening or harassing messages via email or text, web pages or comments devoted to antagonizing an individual. Due to the nature of these offenses, they typically result in harm to the business and its employees.  

Additional harm to the business may be from lack of production due to cyberloafing, which is excessive personal use of equipment or company networks during working hours. Alternately, accessing data via company resources without proper authorization, copying, and disseminating that information for personal gain is another form of workplace deviance created by cybertechnology. Within this technological age companies must be wary of identity deception. Deviant parties also strive to gain unauthorized access or information by misrepresenting themselves online. Due to this companies must be wary of corporate espionage and vet employees carefully that are hired in positions with access to sensitive data. Additionally, measures must be taken to ensure sensitive data is disposed of properly and not accumulated or stored inappropriately to discourage deviant behavior and foster data security.  

REFERENCES: 

Cyber Harassment | Dean of Students | Michigan Tech. (n.d.). Michigan Technological University. https://www.mtu.edu/deanofstudents/policies-resources/intervention/cyber-harassment/ 

Cyberbullying Research Center. (2018, November 27). What is Cyberbullying? Cyberbullying Research Center. https://cyberbullying.org/what-is-cyberbullying 

Definition of DEVIANCE. (n.d.). Www.merriam-Webster.com. https://www.merriam- webster.com/dictionary/deviance