Request Legal Help Now - Free
LAWSUITS NEWS & LEGAL INFORMATION
Home Page >> Feature Articles >> Digital Threats: Emerging Predatory Beha..

Digital Threats: Emerging Predatory Behaviors in the Workplace

.
Increasingly, digital threats are emerging as a new variant of workplace violence: Malicious, digitally-based threats have appeared as a new weapon for the disgruntled employee to perpetrate malice or unwanted pursuit.

Human Resources/Risk Managers have become increasingly familiar with violence in the workplace and are aware of the warning signs that precede a potential threat for physical violence. Now, there are increasing reports of cyber-stalking, email/SMS based harassment, sabotage, theft of intellectual properties and similar malicious behaviors in the workplace.

Physically-Based vs. Digitally-Based Threats

Computer HarrassmentThe warning signs of physically-based threats are easy to spot; they include invasion of personal body space, hostile remarks, visual states of agitation, boundary probing, and a clothing bulge that resembles a weapon. Physically-based threats are often in close proximity of the target/victim, be it reactionary or predatory in nature.

Digitally-based threats differ in that they are non-proximity sensitive. Some examples are identity theft, cyber-stalking, unauthorized access to email and voicemail accounts, spoofing (digital identity masking, disguises, aliases or online camouflaging), deletion/removal of files as well as defacement of web pages and inappropriate or libelous information made available on the Internet.

Barriers, What Barriers?

Physically threatening behaviors often occur in public settings and involve levels of commitment and accountability, desired or not. Psychological barriers towards these inappropriate behaviors are often present.

Digitally-based threats are often perpetrated privately and the lack of accountability and inability for discovery are often strived for: the psychological barriers have diminished through the anonymity of a keyboard. A disgruntled employee who is IT savvy can perpetrate unwanted pursuit or mayhem anonymously from the convenience of his home and away from public scrutiny.

Threat Assessments

There are many approaches to threat assessments, contingent on circumstantial and environmental variables. Subcomponents of a comprehensive threat assessment often include psychological, sociological and organizational risk factors. Let's focus on these subcomponents and any presence of risk factors as it applies to a disgruntled employee and a digital threat potential.

Psychological Risk Factors

Things to watch for in technologically competent employees would be a high sense of entitlement, hostile or passive/aggressive behaviors, control issues, a low accountability for own behaviors, a history of depressions or obsessions, poor anger management and low frustration tolerance.

Sociological Risk Factors

Questions eliciting sociological risk factors include: Does the employee have a victim mentality, or need the "last word"? Is he a "drama creator"thus damaging workplace morale? Does she have very poor people skills, tending to stay to herself? People who have an interest in hacking and attending DEFCON conventions may also give signs of concern, along with Internet-savvy employees experiencing stressors such as financial and relationship problems who exhibit poor social boundaries. And conducting unwanted pursuits of other people should be seen as a threat.

Organizational Risk Factors

Search your networks for possible inroads to delicate information or operation systems. Check for vulnerable intellectual properties, databases and internal memos, as well as Human Resources data. Does the business allow unmonitored data transfers to portable drives? If password management is vulnerable, or there are difficulties in assessing vulnerability in the IT department, this could be a disaster waiting to happen. IT departments and Human Resources departments need to have open communication to avoid leaving data crumbs that can be exploited by those with malicious intent.

Conclusion

With the pervasiveness of information technologies interwoven throughout our daily lives, one should not underestimate a tech-savvy disgruntled employee's ability to have a devastating impact on businesses and institutions. Development of programs and systems to prevent digital threats should be taken seriously in order to prevent workplace violence.

To schedule a complimentary consultation on any matter involving digital threats in the workplace, please contact Atrium Psychological Group at 1-866-446-0991 or visit our website at www.atriumpsych.com.


Atrium Psychological GroupAtrium Psychological Group
11500 Olympic Blvd, Suite 580
Los Angeles, CA 99064
(866) 446-0991
(310) 464-1165

READ ABOUT DIGITAL THREATS LAWSUITS

ADD YOUR COMMENT ON THIS STORY

Fields marked * are mandatory. Please read our comment guidelines before posting.

*Name:

Note: Your name will be published with your comment.

*Email Address:

Your email will only be used if a response is needed.
*Your Comment:

Are you the defendant or a subject matter expert on this topic with an opposing viewpoint? We'd love to hear your comments here as well, or if you'd like to contact us for an interview please submit your details here.


Click to learn more about LawyersandSettlements.com
Request Legal Help Now! - Free