Module 11 Journal 3

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf  sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

After I read this article, I found it is an article about a data breach that www.glasswasherparts.com was hacked by a hacker. The hacker uses the malware on the platform provider’s servers, which allows hackers to get information such as the customer’s name, address, phone number, and any customer’s debit or credit card information. The situation from the article or letter makes me relate to some economics and social sciences theories. For the economics theories, I found it related to Marxian economic theory and Laissez-fare economic theory. First, the Marxian economic theory that states those with power exploit those without power for economic gain, relates to this case that we will see the hacker use their power (malware) and knowledge to exploit people that don’t have knowledge about this topic by stealing people’s personal information. Second, the Laissez-fare economic theory that states government should not intervene in the economy except to protect individuals’ inalienable rights, related to this case that we will see the Glasswasher part company also contact to the government for federal law enforcement to solve this problem. For the social science theory, I found it related to Cognitive theory and Neutralization theory. First, the cognitive theory that theory focuses on the way individuals think and process information relate to this case because the hacker must already think before hacking the website that if he/she hacks this website, he/she will get a lot of information which can make money to him/her. Second, the neutralization theory that states individuals know right from wrong and they rationalize their behavior before committing a crime, relates to this case that the hacker may hack this company because the hacker believes nobody got hurt from the action that the hacker steals the personal information on the digital platform. That are some theories which relate to the letter.

Leave a Reply

Your email address will not be published. Required fields are marked *