Journal Entry #3

on

How has cyber technology created opportunities for workplace deviance?

Increased connectivity, anonymity, and accessibility have all opened the door to new levels of workplace deviance previously unseen.

Unauthorized access has become a major factor in workplace deviance. Disgruntled employees have the opportunity to access vital or sensitive information and leak it to unsavory entities or to the press. The interconnected nature of networks makes it possible for unauthorized users to steal proprietary information, data, customer information, trade secrets, etc.

Another major factor in workplace deviance is the misuse of company resources. Employees can access websites that are unrelated to their profession. Employees have been caught “stealing” company time by shopping online, using social media during work hours, or surfing the internet for funny cat videos. This is a practice called cyberloafing – spending work time on activities unrelated to their job responsibilities.

Identity theft and impersonation: cyber technology has opened the door for employees to steal identities or impersonate higher-ups for personal gain. The advent of AI technology has greatly accelerated this problem. Voices can be mimicked, even facial expressions and mannerisms. Deep-fakes are an example. Workers can impersonate superiors or colleagues in order to gain access to areas or programs that are unauthorized for them.

Online defamation: Employees now have a voice on the internet that anyone can hear. Online defamation is considered workplace deviance because anyone can go to a forum and bad-mouth an organization. False information can be spread about superiors or colleagues or the organization itself. Employees may even engage in cybercrimes using the organization’s programs or credentials, making it seem like these nefarious acts are coming from the organization itself. Documents can be falsified and spread leading to reputational damage. Online defamation is a serious problem for companies that value their public image over anything. Once rumors have been spread, it is difficult to correct the information or call it out as down-right false.

Leave a Reply

Your email address will not be published. Required fields are marked *