This article does a delicate and excellent job when discussing/explaining the bug bounty policies. According to the Journal of Cybersecurtiy it is “programs where gig economy security researchers are compensated for pinpointing and explaining vulnerabilities in company code bases” (Sridhar and Ng). So in this article they explain that they analyzed multiple proprietary datasets in an equation to generate the numbers and information they got. In their conclusion they explain how the experiment went. Which was that we don’t know much about the bug bounty. Which I totally agree with because it can all depend on the hackers supplies, which was in their experiment the independent variable.
Work CitedSridhar, Kiran, and Ming Ng. “Home.” YouTube, 12 March 2021, https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true. Accessed 16 April 2023.