HOW HAS CYBER TECHNOLOGIES CREATED OPPORTUNITIES FOR WORKPLACE DEVIANCE?

Eportfolio #6

Workplace deviance can be defined as an unethical behavior that violates organizational norms about what is right and what is wrong. Today cyber technologies make it much easier to reach out to targets rather than being face-to-face with them directly. Not only does it make it easier for anybody to reach out or to be reached out to but it also enables the ability to pull the trigger and act on it at any given time. Individuals given this ability often tend to be overpowered given the risk that they will ultimately get harder and harder to detect. For example, if an employee was upset with what could be their management or any single one of their other co-workers, they could simply just go online on any device. Whether it’s a phone, computer or tablet and go to their profile, or if they want a little bit more mystery they can create a new anonymous one to voice their displeasure. Not only do they get gifted with the opportunity to say their peace at any given time but with cyber technologies ability today and newer day-to-day methods and apps improving rapidly. They can even get a completely new identity and make it to where they would be nearly impossible to track down simply by acting upon and getting a new VPN. It’s literally that easy. On a larger scale, considering that basically everything in the world that has access to or even slightly relies on internet and Wi-Fi. It has become more possible to not just take down or place your anger on one individual, but you even have the power to impact and affect an entire Empire or even smaller businesses themselves as a whole. With everything practically being online nowadays, sabotaging the systems internally as a form of get back oftentimes could have a major effect on the business and company. You don’t even have to go to the trouble of taking down the systems and networks as a whole, but you can also sabotage and cause PR damage simply by even going online and simply say anything that comes to mind hiding behind the face of said company causing the attention to simply be driven to them and not you, the person behind the screen. The speed at which the effectiveness and damage can occur is less than a second, as all it takes is for one person to see it and screenshot it simply to share it and for it to tread and carry fire from there. The methods in which any individual can attack is endless and forever growing, and day to day it gets easier for them to hide their identities with new toys and tricks

Leave a Reply

Your email address will not be published. Required fields are marked *