{"id":267,"date":"2025-04-04T19:18:09","date_gmt":"2025-04-04T19:18:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/?p=267"},"modified":"2025-04-05T16:27:29","modified_gmt":"2025-04-05T16:27:29","slug":"week-12-journal-entry-12","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/04\/week-12-journal-entry-12\/","title":{"rendered":"CYSE 200S Week 12 Journal Entry, 12"},"content":{"rendered":"\n<p>Read this <a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf Links to an external site.<\/a> sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/p>\n\n\n\n<p><strong>Social Science Theories<\/strong><\/p>\n\n\n\n<p><strong>Labeling Theory<\/strong><\/p>\n\n\n\n<ul>\n<li>The company, now labeled as having experienced a &#8220;data breach,&#8221; may suffer reputational damage. This label may influence how customers view and interact with the company, potentially leading to loss of trust and future business.<\/li>\n<\/ul>\n\n\n\n<p><strong>Structuralism<\/strong><\/p>\n\n\n\n<ul>\n<li>This breach reflects underlying patterns in digital systems, where third-party providers often manage critical data infrastructures. Structuralism helps us see that the breach is not an isolated event but part of a broader cultural and technological system prone to such risks.<\/li>\n<\/ul>\n\n\n\n<p><strong>Economics Theories<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<ul>\n<li> <strong>Institutional Economics<\/strong>  &#8211; The breach reflects how institutional arrangements, such as reliance on third-party platform providers, impact economic behavior and customer trust. Weaknesses in these institutional systems can lead to vulnerabilities, as seen in the case of the compromised payment data. <\/li>\n\n\n\n<li><strong>Game Theory<\/strong>  &#8211; The company\u2019s interaction with law enforcement and its platform provider can be analyzed through game theory. Each party must strategize to protect its interests, whether it&#8217;s minimizing liability, cooperating with investigations, or reassuring customers. <\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Read this https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf Links to an external site. sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter. Social Science Theories Labeling Theory Structuralism Economics Theories<\/p>\n","protected":false},"author":30330,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/posts\/267"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/users\/30330"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/comments?post=267"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/posts\/267\/revisions"}],"predecessor-version":[{"id":271,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/posts\/267\/revisions\/271"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/media?parent=267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/categories?post=267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/tags?post=267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}