Entry 3

How has cyber technology created opportunities for workplace deviance?

Deviance is depicted as the reality or condition of withdrawing from common or acknowledged norms, particularly in friendly adult conduct. Penn State College of IST describes that information and computer technology(ICT) workplace deviance may include sabotaging computer programs, stealing proprietary information, executing viruses and hacking into private computer spaces. While the use of technology in the workplace with great for being able to get in touch with your coworkers easier than ever with the use of email and instant messaging platforms such as Webex and Spark. Even with all the advantages these platforms and other uses of technology bring to the office, they can also cause a lot of problems. According to Robkison and Bennett’s taxonomy of workplace deviance the four key cyber deviance behaviors are cyberbullying, online incivility, cyber loafing, and cyber crime. Cyber crime can happen anywhere at anytime. The advancement in cyber technology has created more opportunities and has made it to where it is much more difficult to track down these individuals committing cyber crimes. Unlike before the advancement of new technology people would have been caught on security cameras or by eye witnesses. For example an employee could have access to the companies encrypted information and was fired before their access was restricted and downloaded all the encrypted information and try to sell it to other competitor companies for personal financial gains or to hold it has blackmail to keep their employment. With all the new advancements, it could allow harmful or disruptive employees to do more harm unnoticeably for a longer period time. With all that being said the use of cyber technology has created more ways for work place deviance to occur and has also made it a lot easier to do and make it much harder to get caught. Work place deviance will always occur in all types of work but cyber technology makes it easier to execute.

Leave a Reply

Your email address will not be published. Required fields are marked *