Journal #6

Cyber technology has ushered in a new era of opportunities for workplace deviance, presenting novel avenues for employees to engage in unethical or illicit behaviors within organizational settings. Here’s how cyber technology has facilitated workplace deviance:
Cyber-enabled Communication Channels: The proliferation of email, instant messaging platforms, and social media in the workplace has provided employees with discrete channels for engaging in deviant behaviors such as gossiping, spreading rumors, or coordinating unethical activities without direct oversight. These digital communication tools enable employees to bypass traditional communication hierarchies and engage in covert exchanges that may undermine organizational goals or norms.
Data Theft and Insider Threats: The digitalization of sensitive information and intellectual property within organizations has increased the risk of data theft and insider threats. Employees with access to confidential data or proprietary systems may exploit their privileges to steal or leak sensitive information for personal gain, competitive advantage, or malicious intent. Cyber technology provides employees with the means to exfiltrate data covertly and cover their tracks, making it challenging for organizations to detect and mitigate insider threats effectively.
Cyberbullying and Harassment: Cyber technology has facilitated the proliferation of workplace deviance in the form of cyberbullying, harassment, and online misconduct. Employees may use digital platforms to harass or intimidate coworkers, spread malicious rumors, or engage in inappropriate behavior that creates a hostile work environment. The anonymity and distance afforded by cyberspace can embolden individuals to engage in deviant behaviors online that they may not exhibit in face-to-face interactions, exacerbating interpersonal conflicts and eroding organizational cohesion.
Unauthorized Access and Misuse of Technology Resources: The prevalence of interconnected IT systems and networked devices in the workplace has created opportunities for employees to engage in deviant behaviors such as unauthorized access, hacking, or misuse of technology resources. Employees may abuse their access privileges to circumvent security controls, tamper with data, or engage in unauthorized activities that compromise the integrity, confidentiality, or availability of organizational information systems.

Leave a Reply

Your email address will not be published. Required fields are marked *