{"id":287,"date":"2022-12-04T16:47:19","date_gmt":"2022-12-04T16:47:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mholl017\/?p=287"},"modified":"2022-12-04T16:47:24","modified_gmt":"2022-12-04T16:47:24","slug":"workplace-deviance-discussion","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mholl017\/2022\/12\/04\/workplace-deviance-discussion\/","title":{"rendered":"Workplace Deviance Discussion"},"content":{"rendered":"\n<p><strong><em>Workplace Deviance&nbsp;<\/em><\/strong><\/p>\n\n\n\n<p>Workplace deviance is a deliberate desire to inflict harm on a person, organization, or company, it can also be defined as a form of aggressive behavior. This is bad for companies because hackers can find ways to get into your computers and access all your information and possibly leak it. Workplace deviance is something to be very cautious of because using your work computer connected to your work WIFI could be an easy target for a hacker looking to hack the company, it gives them easy access.<\/p>\n\n\n\n<p><strong><em>Cyber Technology Creates Opportunities for Workplace Deviance<\/em><\/strong><\/p>\n\n\n\n<p>The start of company computers or giving your workers a computer to use in order to do their jobs seems like a great thing to do to run a company, but in some cases it can result in something going wrong and crashing down on them. Cyber technology has made a whole new field of opportunities by the fact that it\u2019s way harder to trace people so they can\u2019t catch the person who is doing harm to the company. So the hacker could do so much harm in the span they have to hack since it\u2019s difficult to find out who did it.&nbsp;<\/p>\n\n\n\n<p><em>Abuse of Property<\/em><\/p>\n\n\n\n<p>Many employees will use their given laptop in order to stray away from their duties they\u2019re supposed to be fulfilling. While instead, they\u2019ll shop, play games, or log on to websites not pertaining to their work. This opens a huge window of opportunity for hackers because then the employee has wandered into even more unprotected territory of the internet.&nbsp;This can be easier for hackers to track and gain their information easily from any easy website they go onto. Not to mention, they\u2019re using their devices out of property guidelines. The computer was for work use only and not recreational use which shows the deviance and makes it easier to hack.<\/p>\n\n\n\n<p><strong><em>Conclusion<\/em><\/strong><\/p>\n\n\n\n<p>Workplace deviance is a very important topic to learn about since it can happen to anyone at any time. There\u2019s many types of workplace deviance and cyber technology has made it easier for others to hack into companies and to be untraceable which is damaging for a company. Thus, employees and companies will need to be very cautious on what they use company computers for, where they stray on the internet, and be aware of any changes.&nbsp;<\/p>\n\n\n\n<p><strong><em>References<\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/edubirdie.com\/examples\/concept-and-types-of-workplace-deviance\/\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.tutorialspoint.com\/individual_and_group_behavior\/deviant_workplace_behavior.htm\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Workplace Deviance&nbsp; Workplace deviance is a deliberate desire to inflict harm on a person, organization, or company, it can also be defined as a form of aggressive behavior. This is bad for companies because hackers can find ways to get into your computers and access all your information and possibly leak it. Workplace deviance is&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mholl017\/2022\/12\/04\/workplace-deviance-discussion\/\">Read More<\/a><\/div>\n","protected":false},"author":24986,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/posts\/287"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/users\/24986"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/posts\/287\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/posts\/287\/revisions\/288"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/media?parent=287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/categories?post=287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/tags?post=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}