Journal 12

https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf

The attached sample of a data breach notification involves multiple economic theories as well as social science theories. The rational choice theory relates to this sample letter because it explains how businesses and individuals with act in their own best interest. This applies to the sample letter because they explain that the company that was breached was a third party site that processed payments on behalf of the company. It was in the best interest of the company to use a third party because it may have been easier for them or even more inexpensive than developing or using their own payment system. Because of this, it left their customers vulnerable to data breaches since they were not able to ensure the third party company’s security directly. Another economic theory that is represented in the sample letter is the Marxian economic theory. This theory explains that those with power will exploit those with no power. The hackers that breached the third party company’s system may have been looking for an easy target that was not properly secured or adequately monitored. This gave them the opportunity to take advantage of the customers without raising too much suspicion and get away with it for a longer period of time.

Two of the social science theories that relate to this sample breach letter are the Structural Functionalism theory and the Symbolic Interactionism theory. The structural functionalism theory explains how and why society needs proper cybersecurity measure set in place and details the importance of safeguarding our assets and information. The sample letter explains how the company’s payment system is set up and where the weak point was. By using a third party to handle all of their payments for them it opened them up to additional vulnerabilities. The Symbolic Interactionism theory tells us the way in which people interact with technology and how that helps to improve and the current systems and technologies that are in place. This applies to the sample letter because the third party company identified a breach and learned where their weak points were and took measures to patch their systems. They also sent out the letter to educate their customers and explain the necessary steps for them to take in order to protect their information.

Leave a Reply

Your email address will not be published. Required fields are marked *