Cyber-Sabotage: Employee Malfeasance in the Social Media Age
Author | Melany V Franklin |
Pages | 101-124 |
CyberSabotage
EMPLOYEEMALFEASANCE
IN T H E SOC I ALM E DI A AG E
Melany V Franklin*
Disgruntledemployeescancome fromanywhere Howe verthereare
somecommonorfrequentlyobservedpaernsthatmaysignalelevatedvulner
abilityinfuturesituationsForexamplenineoutofofoursubjectswerein
theprocessofdealingwithanextremelyseriousemploymentproblemthathad
endedorthreatenedtheirjobs
Otherindicatorsofvulnerabilitythatmighthaveledtodetectionincluded
theoccurrenceof signicantorganizationwidechanges orstressesas wellas
personalstressors Anothermarkerofriskwas theuniquelevelofsystem
accessandorcontrolobtainedFinallytheseindividualswereconsistently
engagedinsocialorculturalworkplaceconicts
EricDShawLynnFFischer
Thetopicof this papercybersabotagerefersto theuse oftech nology
includingsocia lmediato deliberatelyinicth armona norganization
Thefocusis onthemisuse oftechnologybyemployeesandformerem-
ployeesFor our purposes t he term coversc yberbullying disc losure
MelanyVFrankli nisapartnerwit hBordenLadnerGervaisLLPTorontopractis-
inglabouremploymentandhuma nrightslawShehastakenparti nmisconduct
investigationsinvolvi ngsocialmediaShei sgratefulfortheres earchassista nceof
JacquelineStrandbe rgandRaquelKaplanGoldberga ndtoSteveKahanskyforh is
insights
EricDShawLynnFFischerTenTalesofBetrayalTheT hreattoCorporateInfrastruc
turesbyInformationTechnologyInsidersAn alysisandObservationsMonter eyDefense
PersonnelSecu rityResearcha ndEducationCentreat
MVF
ofcondentialin formationdatathef tdatadestructiona ndcybordina-
tionwhichIwoulddeneasinsubordinatesociamed iapostings
InPart Awedemonstratehow legalprinciplesi ntheemployment
contexthave been appliedto addressc ybersabotageIn Part Bwe ex-
ploreprivacyconsiderationsandquestionsoffair nessthatmaybearon
anemployer sinvestigation intoal legations ofcyber sabotage InPartC
weidentifypracticalstepsthatanemployermaytaketomitigatetherisk
ofharmassociatedwitht hisnewkindofmisconduct
ACYBE R SA B O TAG E I NANE M P L OY M E N T
CONTEXT
Accordingto YogiBerrathe future aintwhatit used tobeInternet
tec hn olog ie shav etran sfo rme dou ri nter act ionsw ith eac hot he rin div id-
uallyandonaglobalscale
Although the rewards associated with t he use of these technolo-
gies are potentially great so are t he risks At an organizationa l level
theInter netis agatewayfor both thegood andt hebadFor wouldbe
whistleblowersitis a megaphoneForthe disgruntled itsasoapbox
ForthievesitsanopportunityForhackersitsachallenge
Thelawhasrespondedtotheseproblemsasitusuallydoesbyap-
plyingtriedandtruelegalprinciplestonovelfactsituationsEventually
theleading caseswil lgiveus aroadmapfor assessingt heseriousness
ofc ybersabotagei na nygiven case and for determining whether the
misconductinquestionwarrantsdismi ssalforjustcause
Butweareintheearlydays
Sabotage
Employeesabotagehasbeendenedasanintentionalactcalculatedto
damageanindividualassociatedwith thecompanycompanyproperty
corporateassetsorthecorporateentityitself
Cybersabotagelikeany wrongdoingissubjec ttodisciplineSabotage
isconsideredaseriousbreachoftrustI nRedirackLtdLtéevUnitedSteel
workersofAmericaLocal ArbitratorHaeingwrites
IPerrinWestonSabotageWorkplaceViole ncePreventionAPracticalGuideto
SecurityontheJobNorthVancouverSpec ialtyTechnicalPubl isherstabFch
atonlinewwwstpubt rainingcomimages DocumentsSABOTAGEpdf
LACdHaeing
To continue reading
Request your trial