Journal Entry #3

on

Technology has drastically changed the workplace. While cyber technology increases employee productivity, it can also create conflict within organizations. With the usage of technology within the workplace, there also comes policies and rules surrounding the usage of applications, devices, and networks. Workplace deviance is when an employee violates company rules and expectations, resulting in harm to individuals or the organization itself. Workplace deviance is not as serious as cybercrime, but can still impact the operational ability of the workplace. There are many forms of workplace deviance using technology, which includes unauthorized access, cyberloafing, workplace cyberbullying, or misuse of information. Unauthorized access is when an employee accesses company resources to gain access to data or computer resources without explicit permission. Cyberloafing is a term which means to spend excessive amounts of work time on non-work related internet activities, which includes social media. Workplace cyberbullying is when an employee uses the companies or other digital communication tools to harass or bully their co-workers. Misuse of information is when a worker uses sensitive company information for their gain. While all of these, except cyberloafing and cyberbullying, can be done without technology, technology drastically makes the other two easier. Workplace bullying could still occur without technology, however, technology makes it far easier to happen and more likely as a result.
Companies can help prevent these actions from occurring with the use of other technology. Access controls which give employees time-based access to computer systems can help prevent them from using company computer systems and accessing information outside of work hours. While keyloggers are highly invasive, cyberbullying could help be prevented by creating an anonymous form to report individuals. From there, the IT team of the company could do an investigation into their workplace communication software to discover any malicious messages. To prevent cyberloafing, content filters could be utilized to block access to non-productive applications.

Source: https://www.currentware.com/blog/should-you-use-keyloggers-on-employee-computers/

Leave a Reply

Your email address will not be published. Required fields are marked *