How has cyber technology created opportunities for workplace deviance?

on

In the past, when a person had something that they wanted to keep secret, safe, or private, the process was very straightforward. They put the important thing in a room or box and lock it. If it’s really important, they would pay someone to watch the room or box and keep anyone from accessing it.
As technology got involved, things slowly began to change. Computers could store information which could be kept safe by the same principle of physical security. This changed in October of 1969 when the first two computers separated by hundreds of miles connected to the ARPANET (Leiner et al., 2022).
As time went on and technology became more sophisticated and available, information security became a focus in the technology sector which made our networks get stronger. This results in a workforce with an average of 9 passwords in the U.S., all with their own requirements (complexity, length, password expiration), which could be a little much for the human mind. This results in potential deviances in password security like using common words or phrases, sequential keys or patterns, or writing passwords near their workstation. (Choong et al., 2014)
From personal experience, I have seen users of technology systems who have multiple accounts they log into on the same computer use a text file labeled “login” that holds the username and passwords for all of their accounts.
Another example ties physical security back to workplace deviance and technology. Locks were designed to keep an area secure. If you had a new employee or intern that was shadowing you for a period of time while their background check or security clearance investigation was still in progress, you would have to be with them every second while on-premises. Before technology you would have to open the door for them to get into your locked space, but technology may entice you to supplant security for laziness and just give them the code.

Choong, Y.-Y., Theofanos, M., & Liu, H.-K. (2014, March). United States Federal Employees’ password management behaviors … – NIST. United States Federal Employees’ Password Management Behaviors – a Department of Commerce Case Study. https://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7991.pdf
Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., Postel, J., Roberts, L. G., & Wolff, S. (2022, September 22). A brief history of the internet. Internet Society. https://www.internetsociety.org/internet/history-internet/brief-history-internet/#LGR67

Leave a Reply

Your email address will not be published. Required fields are marked *