e-portfolio entry #3

How has cyber technology created opportunities for workplace deviance?

Cyber technology has created workplace deviance because people may feel that it’s an easy way to steal. People understand that almost every piece of information is stored online somewhere and if someone can get their hands on a valuable piece of information they would make a lot of money. Then they would try to sell or use it as a means to exploit someone else for money, items, ect. Workplace deviance can also look like anything that involves stealing whether that’s a company’s information about money or employees. Like I stated before, all information is stored online and anybody who has a certain clearance in a company can access most of the company’s information. For example, when Edward Snowden worked at NSA he thought that what they were doing was wrong so he took NSA’s classified information and exposed it to the public. Even though he didn’t try and sell the information he still committed a crime in releasing classified information. This happens rarely, but it still can always happen, that’s why you have to have physical security as a first priority. If physical security is not met, all of the cybersecurity is in vain and doesn’t mean much. Furthermore, an employee can use personal information and use it for their own personal benefit. Some ways companies can stop employees from doing this is restricting them to certain systems and making more certain clearances. Usually the clearances are classified by levels and go from 1 to 5. I think this is the best way to mitigate these activities. However, this is never 100 percent preventable because you cant always keep an eye on the employees. That’s why training is important and trust has to be going both ways rather than just one. Overall, I think workplace deviance is preventable if companies take the correct precautions.

Create that rates software apps
Yacht GPS
By conducting automatic software updates
Electronic ratings
Risk management
Stock protection
Electronic mechanic
Computer security
Understanding and explaining cybersecurity basics
Rating system of different apps
Information technology
Tech specialist
Youth teacher

Leave a Reply

Your email address will not be published. Required fields are marked *