{"id":229,"date":"2024-04-22T16:05:06","date_gmt":"2024-04-22T16:05:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/?p=229"},"modified":"2024-04-22T16:05:06","modified_gmt":"2024-04-22T16:05:06","slug":"journal-entry-12","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/2024\/04\/22\/journal-entry-12\/","title":{"rendered":"Journal Entry 12"},"content":{"rendered":"\n<p>Justin DeLoach<br>31 Mar 2024<br>The first economic theory that relates to the letter would be game theory. As it is<br>an observation on how an attacker and defender compete to maximize their payouts.<br>The second economic theory that relates would be the incentive theory. The incentive<br>theory basically states that the reason that hackers attempt to attack organizations and<br>steal card data is for monetary gain.<br>In regards to social sciences theories the first that I see as relating to the letter<br>would be the rational choice theory. This theory states that the attackers weighed the<br>pros and cons to taking credit card data and decided that it would be worth it to attack<br>the glass washer parts company. Finally the last social science theory that relates to the<br>letter would be the diffusion of innovation theory. This theory basically states that the<br>reason that hackers likely attacked the company is due to the hackers willingness to<br>adopt new and advanced tech while the initial company remained on their prior<br>technologies and policies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Justin DeLoach31 Mar 2024The first economic theory that relates to the letter would be game theory. As it isan observation on how an attacker and defender compete to maximize their payouts.The second economic theory that relates would be the incentive&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/2024\/04\/22\/journal-entry-12\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28356,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/229"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/users\/28356"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/229\/revisions"}],"predecessor-version":[{"id":230,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/229\/revisions\/230"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/media?parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/categories?post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/tags?post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}