Journal #6

How has cyber technology created opportunities for workplace deviance?

Cyber technology has opened the door to many acts of workplace deviance. The availability of company data on workplace computers creates opportunities for valuable information to be stolen, manipulated, or destroyed. For example, a disgruntled employee working in IT is on his way out of the company for any one of various reasons, and, in an act of deviance, he decides to sabotage the company by manipulating files containing sensitive information, thereby costing the company its image, data, and money. Another instance of workplace deviance may be that access controls are not properly set in place. This results in employees gaining access to certain information that should not be made available to them in the first place. You never know what any given employee could do with that data and the consequences that could come from whatever they decide to do. Another factor that causes workplace deviance could result from an employee that is abusing the BYOD policy. Using his or her own device, they can transfer information from the company computers to their own, and possibly sell that information online to the highest bidder or directly to a competitor. This could be vital personal information, company secrets, etc. The financial incentive is always there for malicious employees. Finally, workplace deviance can occur in a situation where a mischievous employee seeks to undermine a coworker as a means to an end. When there is a lack of strong authentication measures, an employee may be motivated to access and tamper with documents belonging to a certain coworker he wishes to replace, as a method of harassment or as a way to gain some occupational benefit, such as a promotion or a raise in salary. These risks can all be mitigated through the implementation of an effective cyber security program, which includes security procedures and policies as well as training for employees.

Leave a Reply

Your email address will not be published. Required fields are marked *