How has cyber technology created opportunities for workplace deviance? Journal 6

Cybersecurity, and technology in general has transformed the workplace in many different ways. Most of these aspects are positive, such as, increased productivity, easier file search methods, and less stress for the organization. However, this new battleground can open doors to negative outcomes too. Technology can be used both for good, and for bad purposes. It is also important to note that people may have good intentions, while some may have bad intentions. These two philosophical ideas play hand in hand with each other, and are important for understanding. Taking all of this into consideration, it is feasible to say that technology can be a medium for workplace deviance. Workplace deviance is when an employee seeks to inflict harm in an organization. These are usually deliberate attacks. There are many ways that this can occur in the physical, but technology opens a whole new door. For example, most employees have access to some type of database, or system that they use throughout their work day. An attack on a system like this could be stealing and selling trade secrets or insider information. This kills two birds with one stone for the disgruntled employee. Firstly, they harm the company by leaking sensitive information, and secondly, the employee can make money by selling the sensitive information. Another example could be defaming, or creating rumors about honest employees throughout the organization to make them look bad. This can all be done technologically so it could be hard to find where exactly the problem started. Workplace deviance could also occur if an employee purposely damages equipment, or deletes certain information. Essentially, the employee wants to harm the company or put them at an inconvenience, which can be costly and time consuming. One key preventative measure in preventing these problems are proper user access controls (UAC) throughout the company. This can help strengthen security, and protect what’s important.

Leave a Reply

Your email address will not be published. Required fields are marked *