Journal 6

on

Introducing cyber technology to the work environment was like opening Pandora’s box. Due to the revolution in how business is conducted, new types of deviant behavior were able to develop, along with old deviant behavior taking on new forms. For example, if a disgruntled employee wanted to spy on his boss for competitors, instead of gathering information by stalking his boss, he can simply launch a Man In The Middle attack against his boss and just siphon all that information to whoever he wants. Other deviant behavior to a lesser degree than corporate espionage, may be inappropriate emails that are sent around the office, or using the company network to pirate movies off the internet. With all the benefits that this technology has brought to workplaces everywhere it is also prone to malfunction itself, which can end up with significant losses for a company, or possibly injure employees. Also, the technology in the office could be used against the very company that owns it by criminals. As the technology continues to evolve, new forms of deviance will form with it. With each new piece of tech that is put into use in a company, new methods of exploiting that technology come with it. This in turn creates new vulnerabilities, which will create new defenses against those vulnerabilities, which in turn creates more attack methods for those defenses. It is a never-ending cycle that applies to every new device that is used. It is doubtful that there will ever be a way to close the lid on this box. So long as people continue to use this technology, they will do it for their own reasons. Whether those reasons are to be productive in society, or for deviant purposes the problem will continue so long as people use the technology that is developed.

Leave a Reply

Your email address will not be published. Required fields are marked *