{"id":191,"date":"2023-12-13T02:49:54","date_gmt":"2023-12-13T02:49:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/?p=191"},"modified":"2023-12-13T02:49:54","modified_gmt":"2023-12-13T02:49:54","slug":"entry-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/2023\/12\/13\/entry-3\/","title":{"rendered":"Entry #3"},"content":{"rendered":"\n<p>The rise of cyber technology has undeniably brought forth new opportunities within the workplace, but it has also created openings for potential deviance. Examining this dual aspect requires recognizing the ways in which cyber technology facilitates opportunities for workplace deviance.<\/p>\n\n\n\n<p>One significant avenue is the misuse of company resources enabled by digital tools. As technology becomes more integrated into daily work operations, employees might exploit these resources for personal gain or non-work-related activities. Whether it&#8217;s excessive personal internet usage, unauthorized software downloads, or using company equipment for personal projects, cyber technology provides the means for such deviant behaviors.<\/p>\n\n\n\n<p>Moreover, the prevalence of digital communication platforms has transformed how colleagues interact. While these platforms enhance collaboration, they can also become channels for deviant behavior, such as cyberbullying or spreading misinformation within the workplace. The relative anonymity offered by digital communication may embolden individuals to engage in behaviors they might avoid in face-to-face interactions.<\/p>\n\n\n\n<p>Additionally, the rise of remote work, accelerated by cyber technology, introduces new challenges. The blurred lines between personal and professional spaces in remote settings may tempt employees to engage in deviant behaviors, such as misrepresenting their working hours or using work time for personal tasks. Managing security over a variety of networks, especially home networks, poses a multitude of risks.<\/p>\n\n\n\n<p>Cyber technology also plays a role in intellectual property theft and data breaches. Employees, either out of malevolence or ignorance, may compromise sensitive company information, leading to potential financial and seriously damage ones reputation.<\/p>\n\n\n\n<p>To mitigate these risks, organizations must implement robust cybersecurity policies, offer comprehensive training on ethical behavior in the digital workplace, and foster a culture of transparency and accountability. It is crucial for employees to recognize the ethical implications of their actions in the digital realm, and for organizations to stay vigilant in adapting policies to the evolving landscape of cyber technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rise of cyber technology has undeniably brought forth new opportunities within the workplace, but it has also created openings for potential deviance. Examining this dual aspect requires recognizing the ways in which cyber technology facilitates opportunities for workplace deviance. One significant avenue is the misuse of company resources enabled by digital tools. As technology &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/ronaldelliott\/2023\/12\/13\/entry-3\/\">Continue reading<\/a><\/p>\n","protected":false},"author":27882,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/posts\/191"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/users\/27882"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/comments?post=191"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/posts\/191\/revisions"}],"predecessor-version":[{"id":192,"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/posts\/191\/revisions\/192"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/media?parent=191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/categories?post=191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ronaldelliott\/wp-json\/wp\/v2\/tags?post=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}