How has cyber technology created opportunities for workplace deviance?

The cyber technology field has been an exponentially fast-growing area of technology that has and will continue to provide more opportunities for workplace deviance. Workplace deviance is defined as “Workplace deviance, in group psychology, may be described as the deliberate (or intentional) desire to cause harm to an organization”. In the cyberworld, deviance here would mean to utilize or take advantage of advanced cyber technology for purposes of malicious intent. That could entail several things such as stealing, harming, and damaging valuable information within an organization. The most prevalent attacks would be for people’s financial gain or for other organizations to steal information. For example, an employee could potentially be working as an insider for another organization to gather the information that would help them. This person could become familiar with the current organization’s cyber security systems to breach them or use his authorized access to gather information. This is a legitimate threat to many organizations around the world and tends to happen frequently as well, especially with the emergence of more advanced technology. Another example would be a person utilizing cyber technology for financial gain. Someone who is familiar with cybersecurity technology and defense could make use of his knowledge to steal from his own organizations or others. An employee could potentially gain unauthorized access to their systems to steal money or other valuable information for their personal use. They could also employ their knowledge of cyber technology and use it to cover up their acts or make it untraceable. The emergence of greater cyber technology has benefits yet can also be very dangerous if they are used maliciously. Companies are now at greater risk for workplace deviance due to this drastic increase in online software technology. Employees may also be more tempted to engage in workplace deviation for personal gain. 

Leave a Reply

Your email address will not be published. Required fields are marked *