ePortfolio entry #3

How has cyber technology created opportunities for workplace deviance?

Without a doubt, cyber technology has revolutionized the workplace, offering a host of advantages like improved productivity, connectedness, and teamwork. But it has also made room for workplace deviance, as workers use digital technologies to support unethical or disruptive behavior. Cyberbullying is when coworkers are harassed, threatened, or harmed by the use of digital networks. Online gossip, improper communications, and abusive emails are some ways that this might appear. Digital communication platforms offer anonymity and distance, which might encourage people to engage in cyberbullying activities. This can result in a dangerous and sometimes unpleasant work atmosphere.

The term “cyberloafing” describes the practice of using digital devices and the internet for purposes unrelated to work while at work. This can be using social media, making online purchases, or working on other private projects. Employees have many opportunities to engage in cyberloafing due to the ease of access to the internet and the integration of personal devices with work environments, which negatively affects output and quality of work. Workers may improperly utilize their access to corporate systems to steal intellectual property, trade secrets, or sensitive data for their benefit or the firm’s detriment. Because current workplace technologies are networked and data is digitalized, employees have more opportunities to take advantage of weaknesses and commit data theft or unauthorized access. Even disgruntled workers may utilize technology to perform harmful acts against the company, such as deleting crucial files, introducing malware, or sabotaging systems.

Employees may even use negative online behaviors including cyberbullying, cyberharassment, and cyberstalking have a connection to the larger topic of cybersecurity. It is difficult for law enforcement, legislators, and prosecutors to track down and apprehend anonymous individuals engaged in cyberstalking or cyber harassment. The availability of disposable mobile phones and pseudonyms for social media account registration complicates efforts to identify the origin of abusive messages. Anonymity exacerbates the fear and worry that victims of cyberstalking or cyberharassment experience.

Leave a Reply

Your email address will not be published. Required fields are marked *