{"id":342,"date":"2023-11-12T19:08:21","date_gmt":"2023-11-12T19:08:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/celli022\/?p=342"},"modified":"2023-11-12T19:08:21","modified_gmt":"2023-11-12T19:08:21","slug":"read-this-https-dojmt-gov-wp-content-uploads-glasswasherparts-com_-pdflinks-to-an-external-site-sample-breach-letter-sample-data-breach-notification-and-describe-how-two","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/celli022\/2023\/11\/12\/read-this-https-dojmt-gov-wp-content-uploads-glasswasherparts-com_-pdflinks-to-an-external-site-sample-breach-letter-sample-data-breach-notification-and-describe-how-two\/","title":{"rendered":"Read this\u00a0https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdfLinks to an external site.\u00a0sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter."},"content":{"rendered":"\n<p>The Laissez-fare theory applies to this sample letter. The idea that the government should intervene only to protect user\u2019s rights comes into play following a breach. The government should be able to step in after a breach to help minimize the loss of user data. The rational choice theory also comes into play. Businesses leave themselves open to breaches because strong cyber security departments can be expensive, and they would rather focus on the bottom line than proper safety in some cases. &nbsp;<\/p>\n\n\n\n<p>The rational choice theory also applies to the social science aspect. The companies know what vulnerabilities they are living with and choose how thoroughly to protect them. The deterrence theory can apply to criminals and companies. The penalties for cybercrime should be high to deter criminals from trying them. The penalties for loss of PII by companies should also be high enough to incentivize proper protection.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Laissez-fare theory applies to this sample letter. The idea that the government should intervene only to protect user\u2019s rights comes into play following a breach. The government should be able to step in after a breach to help minimize the loss of user data. The rational choice theory also comes into play. Businesses leave&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/celli022\/2023\/11\/12\/read-this-https-dojmt-gov-wp-content-uploads-glasswasherparts-com_-pdflinks-to-an-external-site-sample-breach-letter-sample-data-breach-notification-and-describe-how-two\/\">Read More<\/a><\/div>\n","protected":false},"author":27242,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts\/342"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/users\/27242"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/comments?post=342"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts\/342\/revisions"}],"predecessor-version":[{"id":343,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts\/342\/revisions\/343"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/media?parent=342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/categories?post=342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/tags?post=342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}